Shristi Khanna,
Harsh Dev,
- Student, Department of Computer Science and Engineering, School of Engineering, Babu Banarasi Das University (BBDU), Lucknow, Uttar Pradesh, India
- Professor HoD, Department of Computer Science and Engineering, School of Engineering, Babu Banarasi Das University (BBDU), Lucknow, Uttar Pradesh, India
Abstract
Quantum cryptography has emerged as one of the most promising fields in modern information security, offering innovative solutions that have the potential to transform the future of global cyber-defense. Unlike classical cryptographic systems, which depend primarily on the computational difficulty of solving complex mathematical problems, quantum cryptography is grounded in the fundamental and unbreakable laws of quantum mechanics. Core principles such as superposition, entanglement, and the uncertainty principle form the foundation of this science, providing unprecedented levels of security that cannot be replicated by conventional approaches. This study presents a detailed overview of essential methods within quantum cryptography, with particular emphasis on Quantum Key Distribution (QKD), post-quantum or quantum-resistant algorithms, and their importance in securing communication networks against increasingly sophisticated threats. Furthermore, real-world applications and current experimental advancements are examined, demonstrating the growing practicality of these technologies. The study also discusses the significant challenges that must be addressed before widespread implementation, including technical, economic, and infrastructural barriers. By combining theoretical insights with experimental progress, this study highlights the critical role quantum cryptography is expected to play in ensuring the resilience of modern communication systems.
Keywords: Quantum cryptography, quantum key distribution, post-quantum algorithms, secure networks, quantum communication systems
[This article belongs to Journal of Advanced Database Management & Systems ]
Shristi Khanna, Harsh Dev. A Comprehensive Study of Quantum Cryptography. Journal of Advanced Database Management & Systems. 2025; 12(03):12-26.
Shristi Khanna, Harsh Dev. A Comprehensive Study of Quantum Cryptography. Journal of Advanced Database Management & Systems. 2025; 12(03):12-26. Available from: https://journals.stmjournals.com/joadms/article=2025/view=229325
References
- Bennett CH, Brassard G. Quantum cryptography: Public key distribution and coin tossing. Theor Comput Sci. 2014 Dec 4; 560: 7–11.
- Ekert AK. Quantum cryptography based on Bell’s theorem. Phys Rev Lett. 1991 Aug 5; 67(6): 661.
- Bennett CH, Shor PW. Quantum information theory. IEEE Trans Inf Theory. 2002 Aug 6; 44(6): 2724–42.
- Lo HK, Curty M, Tamaki K. Secure quantum key distribution. Nat Photon. 2014 Aug; 8(8): 595–604.
- Pirandola S, Andersen UL, Banchi L, Berta M, Bunandar D, Colbeck R, Englund D, Gehring T, Lupo C, Ottaviani C, Pereira JL. Advances in quantum cryptography. Adv Opt Photonics. 2020 Dec 14; 12(4): 1012–236.
- Kumar M, Pattnaik P. Post quantum cryptography (pqc)-an overview. In 2020 IEEE High Performance Extreme Computing Conference (HPEC). 2020 Sep 22; 1–9.
- Renner R, Wolf S. Simple and tight bounds for information reconciliation and privacy amplification. In International conference on the theory and application of cryptology and information security. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005 Dec 4; 199–216.
- Liao SK, Cai WQ, Liu WY, Zhang L, Li Y, Ren JG, Yin J, Shen Q, Cao Y, Li ZP, Li FZ. Satellite-to-ground quantum key distribution. Nature. 2017 Sep 7; 549(7670): 43–7.
- Sharma P, Agrawal A, Bhatia V, Prakash S, Mishra AK. Quantum key distribution secured optical networks: A survey. IEEE Open J Commun Soc. 2021 Aug 23; 2: 2049–83.
- Woodrum C, Wagner T, Weeks D. Improving 2–5 qubit quantum phase estimation circuits using machine learning. Algorithms. 2024 May 15; 17(5): 214.
- Hooyberghs J. Azure quantum. In Introducing Microsoft Quantum Computing for Developers: Using the Quantum Development Kit and Q. Berkeley, CA: Apress; 2021 Dec 9; 307–339.
- Luo W, Cao L, Shi Y, Wan L, Zhang H, Li S, Chen G, Li Y, Li S, Wang Y, Sun S. Recent progress in quantum photonic chips for quantum communication and internet. Light: Sci Appl. 2023 Jul 14; 12(1): 175.
- Tang X, Wonfor A, Kumar R, Penty RV, White IH. Quantum-safe metro network with low-latency reconfigurable quantum key distribution. J Lightwave Technol. 2018 Sep 16; 36(22): 5230–6.
- Shor PW. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999; 41(2): 303–32.
- Boullosa Dapena Ó. Design of a Quantum-Aware Embedded Language for Autonomous Cyberdefense of Satellite Constellations in Hostile Environments. Available at SSRN 5362121. 2025 Jul 22.
- Kumari A, Behera RK, Sahoo B. Quantum Cloud Computing: Key Technologies, Challenges, and Opportunities. Advances in Quantum Inspired Artificial Intelligence: Techniques and Applications. Cham: Springer; 2025 Jun 3; 99–124.
- Lu CY, Cao Y, Peng CZ, Pan JW. Micius quantum experiments in space. Rev Mod Phys. 2022 Jul 1; 94(3): 035001.
- Riedel M, Kovacs M, Zoller P, Mlynek J, Calarco T. Europe’s quantum flagship initiative. Quantum Sci Technol. 2019 Feb 22; 4(2): 020501.
- Yuen H. Security issues associated with error correction and privacy amplification in quantum key distribution. arXiv preprint arXiv:1411.2310. 2014 Nov 10.

Journal of Advanced Database Management & Systems
| Volume | 12 |
| Issue | 03 |
| Received | 05/08/2025 |
| Accepted | 17/09/2025 |
| Published | 15/10/2025 |
| Publication Time | 71 Days |
Login
PlumX Metrics