Logarithm and QKD: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>SarahB
m (added See Also; inserted carriage returns)
 
(Create page. Sources: Linked pages.)
 
Line 1: Line 1:
1.
''Information technology - cybersecurity.''
The mathematical function which is the inverse of "raising to the power of".
Usually abbreviated to "log".


For example working with logarithms to the base 10:
Quantum key distribution.


log<sub>10</sub>(100) = 2


And 10<sup>2</sup> = 100
== See also ==
 
* [[Cybersecurity]]
More generally with logarithms to the base n:
* [[Dual key]]
 
* [[Encryption]]
log<sub>n</sub>(x) = the power which, when 'n' is raised to it = x
* [[Information technology]]
 
* [[Key]]
For example 10<sup>(log<sub>10</sub>(x))</sup> = x
* [[Private key]]
* [[Public key ]]
* [[Public key encryption]]
* [[Public key infrastructure]]
* [[Quantum computing]]
* [[Quantum key distribution]]
* [[RSA encryption]]
* [[Security]]


And generally n<sup>(log<sub>n</sub>(x))</sup> = x


==Other resource==
*[https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies Quantum security technologies - UK National Cyber Security Centre]


2.
[[Category:Accounting,_tax_and_regulation]]
The logarithm to the base 10.
[[Category:The_business_context]]


 
[[Category:Accounting,_tax_and_regulation]]
== See also ==
[[Category:The_business_context]]
* [[Natural logarithm]]

Latest revision as of 05:06, 7 February 2024