MILITARY MANAGEMENT QUARTERLY

MILITARY MANAGEMENT QUARTERLY

Information Resources Management against Attacks and Imperfect Equipment through Utilizing Quantum Physics

Document Type : Research Paper

Authors
Abstract
A chemical warfare and weapons found an extensive use in the World War I, on the contrary, during the World War II; the creation of atomic physics world as well as the birth of molecular and atomic specialists and scientists had a great and wider significance to the world in terms of scoring victory against the enemies. Nowadays, future warfare is predicted to change to the information warfare by the military specialist and the experts. Moreover, the countries will gain the upper hand in terms of military superiority, providing they equip themselves with the experts and specialists in information technology sciences. This study aims at investigating the organizational management as well as storing and also transferring the information securely based on the latest scientific and technological developments in military organizations. In this study, paradigms changes in managerial issues were highly emphasized and the quantum paradigms were also investigated. Additionally, at the early stages of investigation, different protocols of quantum cryptography were also compared in this study. Thereupon, the weak and the strong points of each protocol were emerged as the result of physics analysis and stimulation techniques. Moreover, Quantum management is capable of optimally utilizing the quantum innate disorders. The findings revealed that in terms of enhancing the quality of communication equipment in confidential information management, the organizations should concentrate more on financial and human resources than confrontation with interception.
Keywords

فهرست منابع

افجه، سید علی‌اکبر و حمزه‌پور، مهدی. (1393). رهیافتی جامع از نظریه رهبری کوانتومی و کاربردهای آن در سازمان. اندیشه مدیریت راهبردی، 8(2)، 161-204.
محمدهادی، فریبرز. (1390). پارادایم کوانتومی در علم مدیریت. مدیریت فرهنگ سازمانی، 9(23)، 71-94.
Bennett, C. H., & Gilles, B. (1984). Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE. International Conference on Computers, Systems and Signal Processing, 175-179.
Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121-3132.
Buchmann, J. (2004). Introduction to Cryptography. Second Edition, Springer.
Dyer, W. W. (1995). Your sacred self. HarperCollins Audio Books.
Ekert, A. K. (1991). Quantum cryptography based on Bell's theorem. Physical Review Letters 67(6), 661-663.
Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1) 145-159.
Gobby, C., Yuan, Z. L., & Shields, A. J. (2004). Quantum key distribution over 122 km of standard telecom fiber. Applied Physics Letters, 84(19), 3762-3764.
Gottesman, D., Lo, H. K., Lütkenhaus, N., & Preskill, J. (2004). Security of quantum key distribution with imperfect devices. In Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on (p. 136). IEEE.
Jennewein, T., Simon, C., Weihs, G., Weinfurter, H., & Zeilinger, A. (2000). Quantum cryptography with entangled photons. Physical Review Letters, 84(20), 4729-4735.
Karakas, F. (2009). New paradigms in organizational development in the 21st century: Positivity, spirituality, and complexity. Organization Development Journal, 27(1), 245-251.
Kollmitzer, C., & Mario, P. eds. (2010). Applied quantum cryptography. Vol. 797. Springer.
Kuhn, T. S. (2012). The structure of scientific revolutions. University of Chicago press.
Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., & O’Brien, J. L. (2010). Quantum computers. Nature, 464(7285), 45-53.
Lütkenhaus, N. (1999). Estimates for practical quantum cryptography. Physical Review, 59(5), 3301-3314.
Lütkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution. Physical Review, 61(5), 52304-52314.
Mayers, D. (2001). Unconditional security in quantum cryptography. Journal of the ACM (JACM), 48(3), 351-406.
Overman, E. S. (1996). The new science of management Chaos and quantum theory and method. Journal of Public Administration Research and Theory, 6(1), 75-89.
Buchmann, J. (2004). Introduction to Cryptography. Springer-Verlag.
Kollmitzer, C., & Pivk, M. (2010). Applied Quantum Cryptography. Springer.
Rogers, D. J. (2010). Broadband Quantum Cryptography. Morgan and Claypool Publishers.
Tittel, W., Brendel, J., Zbinden, H., & Gisin, N. (2000). Quantum cryptography using entangled photons in energy-time Bell states. Physical Review Letters, 84(20), 4737-4740.
Waks, E., Zeevi, A., & Yamamoto, Y. (2002). Security of quantum key distribution with entangled photons against individual attacks. Physical Review, 65(5), 52310-52326.