User:Moonunit42/sandbox

Edits
There is a physical limitation to the measurement for the receiver and the eavesdropper.

These properties give a physical limit to the amount of information one can use to evesdrop. One of which is the The Effect of the observer in a quantum system. In Quantum Mechanics, the mere observation of a system can alter the physical state of the information. . This sets a limit to attacks. The Uncertainty Principle restricts the amount of information in the quantum communication, it is impossible to measure the position and momentum of a quantum particle to a certain degree. The No Cloning Theorem prevents the eves dropper in creating a copy of the qubits.

Discussion on History
''In my short investigation, I found that the History section in Quantum Key Distribution is identical to the second paragraph of Quantum Cryptography. Therefore, It is my responsibility to edit the paragraph in Quantum Cryptography to benefit the reader.''

Quantum Cryptography attributes its beginning by the work of Stephen Wiesner and Gilles Brassard.

It wasn’t until Charles H. Bennet and Gilles Brassard met at the 20th IEEE Symposium on the Foundation of Computer Science held in Puerto Rico on October 1979 that quantum cryptography was revived. ( add and Wiesner's work was published)

" The main breakthrough came when Bennet and Brassard realized that photons were never meant to store information, but rather to transmit it"

In 1982

Article's History
Quantum Cryptography attributes its beginning by the work of Stephen Wiesner and Gilles Brassard. Wiesner, then at Columbia University in New York, who, in the early 1970s, introduced the concept of quantum conjugate coding. His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory Society, but was eventually published in 1983 in SIGACT News. In this paper he showed how to store or transmit two messages by encoding them in two "conjugate observables", such as linear and circular polarization of photons, so that either, but not both, of which may be received and decoded. It wasn’t until Charles H. Bennett, of the IBM's Thomas J. Watson Research Center and Gilles Brassard met at the 20th IEEE Symposium held in Puerto Rico that they discovered how incorporate the findings of Weisner. "The main breakthrough came when we realized that photons were never meant to store information, but rather to transmit it" In 1984, building upon this work, Bennett and Brassard, proposed a method for secure communication, which is now called BB84. In 1991 Artur Ekert developed a different approach to quantum key distribution based on peculiar quantum correlations known as quantum entanglement.

Random rotations of the polarization by both parties have been proposed in Kak's three stage protocol. In principle, this method can be used for continuous, unbreakable encryption of data if single photons are used. The basic polarization rotation scheme has been implemented.

The BB84 method is at the basis of quantum key distribution methods. Companies that manufacture quantum cryptography systems include MagiQ Technologies, Inc. (Boston, Massachusetts, United States), ID Quantique (Geneva, Switzerland), QuintessenceLabs (Canberra, Australia) and SeQureNet (Paris, France).