Digital Data Security by using Quantum Cryptography

Abstract

Security is the most common aspect of today' world, when all things are going to digitize then make them secure over the communication channel has become the prime aim of the digital service providers. Although many encryption and decryption techniques are available in the field of the cryptography, but they all are based on mathematical calculation which are difficult to solve but not impossible. The all existing techniques can be break by using quantum computer and some extra efforts. But Quantum Cryptography that is free from the mathematical calculations and large prime number factorization is solution of this type of problems. Quantum Cryptography based on the laws of physics and quantum mechanics which gives the most secure way of encryption and decryption. In this paper Key Generation and Exchanging of Key is implemented by using Visual Basic software to secure the digital data over the communication channel. Quantum cryptography will use Photons to transmit the information over the channel which are polarized at different orientation which are 00,450,900 and 1350 from sender at some basis and these polarized information is received by second party at other end and receiver will match the received photon with his photon on his basis and matched photons will form the Key, and if anyone try to hack that information both parties will come to know about the hacking. Mohd. Amjad | Raju"Digital Data Security by using Quantum Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15900.pdf http://www.ijtsrd.com/engineering/computer-engineering/15900/digital-data-security-by-using-quantum-cryptography/mohd-amjad

Authors and Affiliations

Keywords

Related Articles

Nàgàrjunas Reflection on Motion and Rest

Nagarjuna C.150 - C.250 is considered to be one of the most famous thinkers of Indian Mahayana Buddhism, specially, in the Tibetan tradition and referred to as The Second Buddha. Nagarjuna categorically repudiates the re...

Arduino Based Automatic Car Washing System

In this modern era automation helps us to save time, cost as well as manpower. Vehicles are used extensively for transportation. To clean these vehicles there is a need of a proper washing system. The most common problem...

Visual Cryptography for Image Processing: A Survey

The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the pi...

Infrastructure and culture as competitive advantage in enhancing secondary school's performance in Kenya Certificate of Secondary Examination in Kenya. A case of Bungoma County

Secondary schools incubate and hatch the youth from their teens and transform them into adults in pursuit of vocational and academic careers in the Kenyan economy. The success of a secondary school is determined by the p...

Relationship Between Teachers Motivation and Students Academic Performance

This paper examined the impact of teacher motivation on academic performance of students. It proceeded by defining teacher motivation as a general term applying to the entire class of drives, desires, needs, wishes and s...

Download PDF file
  • EP ID EP389238
  • DOI -
  • Views 82
  • Downloads 0

How To Cite

(2018). Digital Data Security by using Quantum Cryptography. International Journal of Trend in Scientific Research and Development, 2(5), 482-489. https://europub.co.uk/articles/-A-389238