cryptography,
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 1, Issue 8
Abstract
Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides th solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given. Using the EPR method, Alice and Bob could potentially store the prepared entangled particles and then measure them and create the key just going to use it, eliminating the problem of insecure storage. In the Next phase, proposed mechanism is described. The proposed mechanism combines EPR protocol at two stages, (1) from sender to receiver and then (2) from receiver to sender. Doubling EPR protocol enhances information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange.
Authors and Affiliations
Rambabu Saini
OLD IS GOLD W.R.TO EDUCATIONAL SECTOR
Over the past two decades the word “Globalization” has become a common word that is heard in many international conferences and large gatherings. A number of definitions of globalization related to the provisi...
REVIEW PAPER ON MEMS DOMAIN
MEMS is a new manufacturing technology, a new way of making complex electromechanical systems using batch fabrication techniques similar to the way integrated circuits are made and making these electromechanical element...
A METHOD TO OBTAIN THE POSITION RELATION OF TWO POLYGONAL CONTOURS DEFINED BY PRIMITIVES IN THE SAME PLANE
This p aper presents an original method for determination position relation between two polygonal coplain contours used an original algorithm proposed by author for determination the position relation of a point wit...
Spectroscopic Aspects of Gradient-Porosity System
Laser-assisted etching process with the illumination of short laser wavelength of 405nm has been used to prepare efficient and thin layers of gradient- porosity porous silicon (GPSi) by employing two techniques; a...
Comparative Analysis of IPV6 Based IS-IS and OSPF-V3 Protocols
This paper deals with the critical issues of OSPF V3 & IS-IS in IPV6. As IPV6 is becoming popular day by day; due to its wide range of applications; and great hierarchy of IPs. But selecting the best protocol...