cryptography,
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 1, Issue 8
Abstract
Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides th solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given. Using the EPR method, Alice and Bob could potentially store the prepared entangled particles and then measure them and create the key just going to use it, eliminating the problem of insecure storage. In the Next phase, proposed mechanism is described. The proposed mechanism combines EPR protocol at two stages, (1) from sender to receiver and then (2) from receiver to sender. Doubling EPR protocol enhances information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange.
Authors and Affiliations
Rambabu Saini
Feasibility Study of Electro-Coagulation as a Treatment Method for Textile Industry Wastewater
Electro-coagulation (EC) is becoming a popular process to be used for industrial wastewater treatment. In the present study, a laboratory scale electro-coagulation (EC) process was utilized to treat the textile wa...
INVESTGATION OF RANKING RATING AND REVIEW USING STATISTICAL HYPOTHESES TESTS
Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list Indeed, it becomes more and more frequent for App developers t...
THERMO-ELECTRIC POWER GENERATION USING SOLAR AS AN ALTERNATIVE GREEN TECHNOLOGY
In recent years, an increasing concern of environmental issues of emissions, in particular global warming and the limitations of energy resources has resulted in extensive research into novel technologies of genera...
INTEGRATION BY PARTS FORMULA INVOLVING MALLIAVIN DERIVATIVES AND SOLUTIONS TO DELAY SDE’S
In the present work we have established an integration by parts formula of higher order Malliavin derivatives of solutions to delay stochastic differential equations. In a squeal work we will use this integration...
EFFECT OF DIFFERENT TYPES OF ELECTRODES ON SURFACE RESIDUAL STRESSES INDUCED BY EDM PROCESS FOR AISI D2 DIE STEEL
Electrical-discharge machining (EDM) technique has been increasingly adapted to new industrial applications within the field of aerospace, medical, die and mould production, precision tooling, etc. This paper conc...