Research Article

Entropy Security in Quantum Cryptography

by  Hitesh Singh, D. L. Gupta, A. K Singh
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Issue 5
Published: November 2013
Authors: Hitesh Singh, D. L. Gupta, A. K Singh
10.5120/14008-2057
PDF

Hitesh Singh, D. L. Gupta, A. K Singh . Entropy Security in Quantum Cryptography. International Journal of Computer Applications. 81, 5 (November 2013), 19-24. DOI=10.5120/14008-2057

                        @article{ 10.5120/14008-2057,
                        author  = { Hitesh Singh,D. L. Gupta,A. K Singh },
                        title   = { Entropy Security in Quantum Cryptography },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 81 },
                        number  = { 5 },
                        pages   = { 19-24 },
                        doi     = { 10.5120/14008-2057 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Hitesh Singh
                        %A D. L. Gupta
                        %A A. K Singh
                        %T Entropy Security in Quantum Cryptography%T 
                        %J International Journal of Computer Applications
                        %V 81
                        %N 5
                        %P 19-24
                        %R 10.5120/14008-2057
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum mechanics is the basic principle which is applied in the cryptographic scenario of quantum cryptography. Present paper provides a conceptual framework on the high level security protocol in Quantum cryptography. This is used as a base for data security through quantum computing in modern cryptosystem. In this paper first of all a detailed description of BB84 protocol with noise and without noise is explained, then a detailed description of mathematical analysis done by [1] on entropy security is also shown. Finally the result of the experimental work done on Matlab is shown. Our work reveals that at only 37 % bit of the key, we get maximum entropy security in communication network. . In this approach it is also possible to manage security as well as personalize services based on Quantum cryptography in better way.

References
  • M. Niemiec, "Design Construction and Verification of a High-level Security Protocol Allowing to Apply the Quantum Cryptography in Communication Networks", 2011, Ph. D. Thesis, AGH University Of Science and Technology, Poland.
  • C. H. Bennett and G. Brassard, "Quantum cryptography: public key distribution and coin tossing," Proc. of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
  • M. Niemiec, "D8. 6 specification & Evaluation of quantum cryptography for security & privacy assurance"2012, AGH University of Science and Technology, Poland.
  • T. Godhavari and N. R. Alamelu, "Quantum based secure information transmission", European journal of scientific research, ISSN 1450-216X, Vol. 66. No2 (2011) pp243-254
  • D. Dieks,"Communication by EPR Devices", Physics Letters A, vol. 92, No. 6, 1982 pp. 271-272.
  • Wootters, W. K. , and W. H. Zurek, "A Single quantum cannot be cloned", Nature, 299, pp. 982-983, 1982.
  • G. Brassard and L. Salvail "Secret key reconciliation by Public discussion", Advances in Cryptology: Eurocrypt 93 Proc. Pp. 410-23, 1993.
  • C. Gobby, Z. L. Yuan and A. J. Shields, "Quantum key distribution over 122 km telecom fiber", Appl. Phys. Lett. 84, pp. 3762–3764, 2002.
  • D. Gottesman, H. K. Lo, N. Lutkenhaus and J. Preskill, "Security of quantum key distribution with imperfect devices", Quantum Information Computation. 4, pp. 325–360, 2004.
  • K. J. Gordon, V. Fernandez, G. S. Buller, I. Rech, S. D. Cova and P. D. Townsend, "Quantum key distribution system clocked at 2 GHz," Optics Express 13, pp. 3015–3020, 2005.
  • C. H. Bennett: "Quantum cryptography using any two non orthogonal states", Physical Review Letters, Vol. 68, No. 21, 25, pp. 3121-3124, 1992.
  • Jacobs, B. C and J. D Franson, "Quantum cryptography in free space", Optics Letters, Vol. 21, pp. 1854-1856, 1996.
  • R. J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson and C. Simmons "Quantum Cryptography over underground optical fibres", Advances in Cryptology: Proceeding of CRYPTO'96.
  • C. Kollmitzer, M. Pivk, "Applied Quantum Cryptography", Lect. Notes Phys. 797, Published in Springer, Berlin Heidelberg 2010.
  • R. Pike and B. Labs, "An Introduction to Quantum Computation and Quantum Communication", Published by Lucent Technologies.
  • MathWorkswebside. http://www. mathworks. com
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Quantum cryptography entropic security information theory quantum key distribution Qubits BB84 protocol.

Powered by PhDFocusTM