cryptography,

Abstract

Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides th solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given. Using the EPR method, Alice and Bob could potentially store the prepared entangled particles and then measure them and create the key just going to use it, eliminating the problem of insecure storage. In the Next phase, proposed mechanism is described. The proposed mechanism combines EPR protocol at two stages, (1) from sender to receiver and then (2) from receiver to sender. Doubling EPR protocol enhances information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange.

Authors and Affiliations

Rambabu Saini

Keywords

Related Articles

 Comparative Analysis between PI and Wavelet Transform for the Fault Detection in Induction Motor

 Squirrel cage Induction motor is widely used in industries because roughest construction, highly reliable, low cost, high efficiency, user friendly and maintenance is minimum as compare to other motor. Induction m...

 AN OVERVIEW ON RECOMMENDATION SYSTEMS AVAILABLE FOR TAXI DRIVERS AND PASSENGERS

 We all are using different transportation facility to travel to particular location in our day today life. While traveling from one place to other, as time is changing ,the way we travel is also changing very fast...

 COUETTE FLOW OF A JEFFREY FLUID IN A ROTATING CHANNEL

 The steady flow of a Jeffrey fluid between two infinite parallel plates separated by a distance h is investigated. The upper plate moves with constant velocity U0 in x  direction, where the x  axis is take...

Removal Techniques Of Phosphorus From Waste Water To Enhance Its Reuse Potential To Meet The Water

Wastewater contains high levels of nutrients like nitrogen and phosphorus depending on industrial sources, water conservation, or whether a detergent ban is in place. Excessive release of these to the environment can le...

 EQUILIBRIUM AND KINETIC STUDIES OF BIOSORPTION OF REACTIVEORANGE 13 FROM AQUEOUS SOLUTION BY DEAD BIOMASS OF RHIZOPUSARRHIZUS

 The equilibrium and kinetics of the biosorption of Reactive Orange 13from aqueous solution were investigatedusing dead biomass of Rhizopus arrhizus in a batch system. Biosorption equilibrium was established in abou...

Download PDF file
  • EP ID EP111939
  • DOI -
  • Views 61
  • Downloads 0

How To Cite

Rambabu Saini (30). cryptography,. International Journal of Engineering Sciences & Research Technology, 1(8), 432-439. https://europub.co.uk/articles/-A-111939