Open Access Open Access  Restricted Access Subscription Access

An Efficient System for Transmission of Data over Network using QKD


Affiliations
1 Suryodaya College of Engineering and Technology, Nagpur, India
 

Most of the web based applications requires a security for the data. Providing security to the data is a process known as cryptography, which consists of encryption and decryption process. Most of the conventional cryptographic algorithms used in the environments of communication network, based on mathematical models and computational assumptions, are unsafe and apt by many attackers. Problems associated with private-key encryption process is, firstly it depends entirely on the secrecy of the key, secondly it requires two parties who initially shares no secret information to exchange a secret key and an eavesdropper can snoop secret key as it is being exchanged. In Public-key encryption there is no key distribution problem; however, security relies on unproven mathematical assumptions such as the difficulty in factoring large integers. To overcome above mentioned limitations associated with both approaches, we have designed an approach to augment private key encryption with quantum key distribution. Experimental results showed that proposed approach outperforms better than existing approaches.
User
Notifications
Font Size

  • Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, and Masahide Sasaki, “Highly Secure Network Switches with Quantum Key Distribution Systems”, International Journal of Network Security, Vol.17, No.1, PP.34–39, Jan. 2015.
  • C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J. Schlafer, , and H. Yeh, “Current status of the DARPA quantum network,” in Quantum Information and Computation III, pp. 138–149. SPIE, 2005.
  • Sanchez-Avilaf&R. Sanchez-Reillot,TheRijndael Block Cipher (AES Proposal): A Comparison with DES, Universidad Politecnica de Madrid, 28040 Madrid, Spain.
  • TianqiZhou,JianShen ,XiongLi,Chen Wang and Jun Shen,”Quantum Cryptography for the Future Internet andthe Security Analysis”Chinese Academy of Sciences, Beijing, China3Hunan University of Science and Technology, Xiangtan,China.
  • J. Aditya, P. Shankar Rao,” Quantum Cryptography” Dept of CSE, Andhra University,AndraPradesh,India.
  • Richard J. Hughes,D. M. Alde, P. Dyer, G. G. Luther, G. L. Morgan and M. Schauer,”Quantum Cryptography” University of California Physics Division Los Alamos National Laboratory Los Alamos, NM 87545,USA.
  • Mart Haitjema,”A Survey of the Prominent Quantum Key Distribution Protocols”University of Washington,USA.
  • Alan Mink, Sheila Frankel and Ray Perlner,” Quantum Key Distribution (QKD) andCommodity Security Protocols: Introduction and Integration”National Institute of Standards and Technology (NIST),100 Bureau Dr., Gaithersburg, MD 20899.
  • R. D. Sharma and A. De, “A new secure model for quantum key distribution protocol,” in Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on. IEEE, 2011, pp. 462–466.
  • N. S. Yanofsky and M. A. Mannucci, Quantum computing for computer scientists. Cambridge University Press Cambridge, 2008, vol. 20.
  • M. D. H. Kulkarni, “Research directions in quantum cryptography and quantum key distribution,” International Journal of Scientific and Research Publications, vol. 2, no. 6, June 2012.

Abstract Views: 186

PDF Views: 84




  • An Efficient System for Transmission of Data over Network using QKD

Abstract Views: 186  |  PDF Views: 84

Authors

Harshal Choukhe, Shitan Dhir, Mahesh Punde, Kanchan Kukde, Kiran Birgodiya, Ruchira Selote
Suryodaya College of Engineering and Technology, Nagpur, India

Abstract


Most of the web based applications requires a security for the data. Providing security to the data is a process known as cryptography, which consists of encryption and decryption process. Most of the conventional cryptographic algorithms used in the environments of communication network, based on mathematical models and computational assumptions, are unsafe and apt by many attackers. Problems associated with private-key encryption process is, firstly it depends entirely on the secrecy of the key, secondly it requires two parties who initially shares no secret information to exchange a secret key and an eavesdropper can snoop secret key as it is being exchanged. In Public-key encryption there is no key distribution problem; however, security relies on unproven mathematical assumptions such as the difficulty in factoring large integers. To overcome above mentioned limitations associated with both approaches, we have designed an approach to augment private key encryption with quantum key distribution. Experimental results showed that proposed approach outperforms better than existing approaches.

References