全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

An Effective Technique For Data Security in Modern Cryptosystem

Keywords: C-qubits algorithm , BB84 protocol , qubits , quantum key distribution , privacy amplification , information reconciliation and hashing function.

Full-Text   Cite this paper   Add to My Lib

Abstract:

Present paper provides a conceptual framework on the proposed C-QUBITS Key exchange technique, which is used as a base for the data security through quantum computing in the modern cryptosystem. In the first phase a detailed description of the BB84 Cryptographic protocol is given, which is used as a standard protocol for quantum key distribution in quantum cryptography and the emphasis is also given on the loopholes present in this protocol which makes it less effective than it pretends to be. In the next phase the focus is made on the C-QUBITS technique, which can be used for the exchange of key between the sender and the receiver. Thereafter the key is used for the encryption of the data to be transferred between the two entities. This technique makes use of the concepts of quantum physics like polarization and more importantly C-NOT gate which is mainly used in case of qubits (quantum bits) and it is more effective and secure than the BB84 protocol. In the last phase the focus is made on the information reconciliation and privacy amplification, which is used for error correction carried out between Alice and Bob's keys and for reducing a third party’s partial information about the shared secret key between two parties, Alice and Bob respectively. Further the security level in the C-QUBITS technique can be increase by performing the privacy amplification that convert the realized secret key into a smaller length key through some hashing function chosen at random from a known set of hashing functions.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413