QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL

KAUSIK SAHA, Sirshendu Sekhar Ghosh, Dilip Kumar Shaw

Abstract


Cryptography is being introduced to secure data. Through Classical Cryptographic technique, we can encrypt our data and secure secret key also. But classical cryptography is based on mathematical techniques where reversing one-way function is possible with sufficient computing power and time. So, Quantum Cryptography is introduced to overcome those drawbacks of traditional classical cryptography. It is based on the values of quantum mechanics and photon. Scientists and researchers have brought up a new key distribution protocol based on Quantum Cryptography is called Quantum Key Distribution (QKD) Protocol. The first QKD protocol BB84 was introduced by Charles Bennett and Gilles Brassard in 1984. After that several QKD protocols have been created. In this paper we have improved BB84 Protocol by removing the drawbacks of the existing algorithm towards Eavesdropping which may not be detected or disclosing large portion of secret key. Steps of the existing BB84 algorithm along with the modified one is described in detail with example and pseudo code. Limitations of BB84 and comparative study of both the existing and the improved one based on their security has been made and described in this current work.

Keywords


Quantum Cryptography, Quantum Key Distribution, QKD Protocols, BB84 Protocol, Improved BB84 Protocol.

Full Text:

PDF

References


W. Stallings, “Cryptography and Network Security: Principles and Practice”, 6th ed., Pearson Education Inc., 2014, pp. 9-12.

Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”, 3rd ed., Tata McGraw Hill Education(India) Pvt. Ltd., New Delhi, 2016.

N. Kaur, “Enhancement of Network Security Techniques using Quantum Cryptography”, International Journal on Computer Science and Engineering (IJCSE), 2011.

Zhao Sheng-Mei, Li Fei, and Zheng Bao-yu, “A Proof of Security of Quantum Key Distribution in Probabilistic Clone Scheme”, Communication Technology Proceedings (ICCT), vol. 2, 2003, pp. 1507-09.

Miss. Payal P. Kilor, Mr. Pravin. D. Soni, “Quantum Cryptography: Realizing next generation information security”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 2, February 2014.

C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing”, Proceeding of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.

Hitesh Singh, D.L. Gupta, A.K Singh, “Quantum Key Distribution Protocols: A Review”, IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, ver. XI (Mar-Apr. 2014), pp. 01-09.

C. H. Bennett, F. Bassett, G. Brassard, L. Salvia, and J. Smiling, “Experimental quantum cryptography,” J. Cryptal. vol. 5, no. 1, 1992, pp. 3–28.

Akash Shrivastava, Manvendra Singh, “A Security Enhancement Approach in Quantum Cryptography”, IEEE 5thInternation Conference on Computers and devices for Communications(CODEC), 2012.




DOI: https://doi.org/10.26483/ijarcs.v9i2.5673

Refbacks





Copyright (c) 2018 International Journal of Advanced Research in Computer Science