Glossary – Definitions
Quantum distribution of cryptographic keys DQC
Article REF: H5214 V1
Glossary – Definitions
Quantum distribution of cryptographic keys DQC

Author : Patrick René GUILLEMIN

Publication date: April 10, 2015 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

7. Glossary – Definitions

side channel attack

Attack that does not concern the theoretical security method. It seeks out and exploits weaknesses in the practical means of implementation: human procedure, external behavior (computing time) of software or hardware (electromagnetic radiation, noise).

Vernam cipher; Vernam cipher/one-time pad

Symmetrical encryption based on the logical function XOR (exclusive OR) using unique (ephemeral) keys made of random bits that are the same size as the messages. This encryption has been shown to be tamper-proof (ITS), but difficult to implement due to the impossibility of truly secretly exchanging the encryption keys used (or disposable masks) between sender and receiver.

confidentilité persitante; forward secrecy

Term used in the QSC white paper, cryptographic...

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Glossary – Definitions

Article included in this offer

"Security of information systems"

( 86 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details