%0 Journal Article %T An Effective Technique For Data Security in Modern Cryptosystem %A Dilbag Singh %A Ajit Singh %J BVICAM's International Journal of Information Technology %D 2010 %I Bharati Vidyapeeth's Institute of Computer Applications and Management %X Present paper provides a conceptual framework on the proposed C-QUBITS Key exchange technique, which is used as a base for the data security through quantum computing in the modern cryptosystem. In the first phase a detailed description of the BB84 Cryptographic protocol is given, which is used as a standard protocol for quantum key distribution in quantum cryptography and the emphasis is also given on the loopholes present in this protocol which makes it less effective than it pretends to be. In the next phase the focus is made on the C-QUBITS technique, which can be used for the exchange of key between the sender and the receiver. Thereafter the key is used for the encryption of the data to be transferred between the two entities. This technique makes use of the concepts of quantum physics like polarization and more importantly C-NOT gate which is mainly used in case of qubits (quantum bits) and it is more effective and secure than the BB84 protocol. In the last phase the focus is made on the information reconciliation and privacy amplification, which is used for error correction carried out between Alice and Bob's keys and for reducing a third party¡¯s partial information about the shared secret key between two parties, Alice and Bob respectively. Further the security level in the C-QUBITS technique can be increase by performing the privacy amplification that convert the realized secret key into a smaller length key through some hashing function chosen at random from a known set of hashing functions. %K C-qubits algorithm %K BB84 protocol %K qubits %K quantum key distribution %K privacy amplification %K information reconciliation and hashing function. %U http://www.bvicam.ac.in/bijit/Downloads/pdf/issue3/07.pdf