cryptography,

Abstract

Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides th solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given. Using the EPR method, Alice and Bob could potentially store the prepared entangled particles and then measure them and create the key just going to use it, eliminating the problem of insecure storage. In the Next phase, proposed mechanism is described. The proposed mechanism combines EPR protocol at two stages, (1) from sender to receiver and then (2) from receiver to sender. Doubling EPR protocol enhances information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange.

Authors and Affiliations

Rambabu Saini

Keywords

Related Articles

 EMMO MODEL FOR E-LEARNING

 Online learning is becoming a revolutionary force for improvement in education standards and quality. The applications include digital libraries (text documents, images, sound, video), manufacturing and retailing,...

 SEEWAGE SLUDGE ASH (SSA) IN PRECAST CONCRETE BLOCKS

 The present study explored the technological feasibility of re-using sewage sludge ash (SSA) as a Portland cement replacement in commercially manufactured pre cast concrete blocks. The blocks analysed were made to...

 IMAGE ENHANCEMENT USING AUTOMATIC SEGMENTATION TECHNIQUES

 This paper provides automatic image segmentation using dynamic region merging algorithm. Image segmentationis to partition the image into meaningful regions with respect to particular application. Image segmentatio...

DESIGN AND ANALYSIS OF TUBULAR HEAT EXCHANGER FOR VARYING TEMPERATURE PROFILES USING ALTAIR HYPERMESH

This Paper deals with the heat transfer of shell and tube or simply tubular type heat exchanger for different no of tubes with varying temperatures. It provides a linear steady state thermal analysis which further be an...

 USING RFID TO TRACK PATIENT’S HEALTH

 When we hear the word patient, the first thing that strikes our mind is a hospital and lots of treatments and tests that are being done on him/her by doctors. In a hospital, there are many patients and these patie...

Download PDF file
  • EP ID EP111939
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

Rambabu Saini (30). cryptography,. International Journal of Engineering Sciences & Research Technology, 1(8), 432-439. https://europub.co.uk/articles/-A-111939