cryptography,

Abstract

Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides th solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given. Using the EPR method, Alice and Bob could potentially store the prepared entangled particles and then measure them and create the key just going to use it, eliminating the problem of insecure storage. In the Next phase, proposed mechanism is described. The proposed mechanism combines EPR protocol at two stages, (1) from sender to receiver and then (2) from receiver to sender. Doubling EPR protocol enhances information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange.

Authors and Affiliations

Rambabu Saini

Keywords

Related Articles

 Study on Economical Aspect of R.C.C Beam Slab Construction and Grid Slab Construction

 This paper presents the comparison of R.C.C Beam Slab, One-Way Continuous Slab and Grid Slab. This work includes the design and estimates for R.C.C Beam Slab, One-Way Continuous Slab and Grid Slab. The aim of this...

 Study of Wear Characteristics of AISI H11 Steel

 In metal casting and forming industries, the wear of dies continues to be a great concern to the automotive industry due to increasing die maintenance cost and scrap rate. The demand to reduce the use of lubricant...

Data Aggregation Using Genetic Algorithm in Wireless Sensor Network

A sensor network consists of one or more “sinks”. The sensors in the network act as “sources” which detect environmental events and push relevant data to the appropriate sinks. Sensors transmit information towards the s...

INHIBITION OF E.CANCEROGENUS MAB-1 β -LACTAMASE BY SYNERGISTIC FORMULATION: AN IN VITRO HERBAL SHOTGUN STUDY

β-lactamases are increasing worldwide speedily by creating problem to currently available UTI therapies and hence there is an urgent need of research to find the effective therapy. In the present study we propose to deve...

 Transformer-less Grid Connected PV Inverter for Single Phase System

 There is a strong trend in the photovoltaic inverter technology to use transformer-less topologies in order to acquire higher efficiencies combining with very low ground leakage current. The DC/AC inverters are us...

Download PDF file
  • EP ID EP111939
  • DOI -
  • Views 60
  • Downloads 0

How To Cite

Rambabu Saini (30). cryptography,. International Journal of Engineering Sciences & Research Technology, 1(8), 432-439. https://europub.co.uk/articles/-A-111939