Quantum Cryptography Enhancement of QKD EPR Protocol & Identity
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.1, No. 10)Publication Date: 2012-10-30
Authors : Rambabu Saini;
Page : 432-439
Keywords : Keywords: Quantum cryptography; Quantum key distribution; BB84 algorithm; EPR algorithm; Identity;
Abstract
Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptographic system by providing a secure communication channel between two parties with high security guaranteed by the fundamental lows of the physics. Quantum cryptography provides th solution that uses property of polarization to ensure that transmitted data is not disturbed. Basic protocols for QKD provide maximum 25% (B92 protocol) and 50% (BB84 and EPR) idealized efficiency receptively, which is not enough for secure transmission of shared key. This work provides the mechanism that enhances the data security in quantum cryptography during exchange of information by increasing the size of shared key up to 75%. The identity verification mechanism tries to provide maximum success for explanation of Quantum key distribution’s EPR protocol is given. Using the EPR method, Alice and Bob could potentially store the prepared entangled particles and then measure them and create the key just going to use it, eliminating the problem of insecure storage. In the Next phase, proposed mechanism is described. The proposed mechanism combines EPR protocol at two stages, (1) from sender to receiver and then (2) from receiver to sender. Doubling EPR protocol enhances information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange
Other Latest Articles
- Mathematical Approaches For Computer Virus
- Software Metrics Evaluation Using Various Lines Of Code And Function Point
- Wave Energy Collector: Theoretical Model For Harnessing The Potential Energy
- Case Study of Wireless Networking for Small Business
- Interference Mitigation in LTE HetNet by Resource Allocation
Last modified: 2014-11-15 22:23:00