An Efficient System for Transmission of Data over Network using QKD

Harshal Choukhe, Shitan Dhir, Mahesh Punde, Kanchan Kukde, Kiran Birgodiya, Ruchira Selote
Volume 6: Issue 1, March 2019, pp 12-15


Author's Information
Harshal Choukhe1 
Corresponding Author
1Suryodaya College of Engineering and Technology, Nagpur, India
harshalchoukhe1234@gmail.com

Shitan Dhir, Mahesh Punde, Kanchan Kukde, Kiran Birgodiya, Ruchira Selote
1Suryodaya College of Engineering and Technology, Nagpur, India


Research Article -- Peer Reviewed
Published online – 01 April 2019

Open Access article under Creative Commons License

Cite this article – Harshal Choukhe, Shitan Dhir, Mahesh Punde, Kanchan Kukde, Kiran Birgodiya, Ruchira Selote, “An Efficient System for Transmission of Data over Network using QKD ”, International Journal of Analytical, Experimental and Finite Element Analysis, RAME Publishers, vol. 6, issue 1, pp. 12-15, March 2019.
https://doi.org/10.26706/ijaefea.1.6.20190304


Abstract:-
Most of the web based applications requires a security for the data. Providing security to the data is a process known as cryptography, which consists of encryption and decryption process. Most of the conventional cryptographic algorithms used in the environments of communication network, based on mathematical models and computational assumptions, are unsafe and apt by many attackers. Problems associated with private-key encryption process is, firstly it depends entirely on the secrecy of the key, secondly it requires two parties who initially shares no secret information to exchange a secret key and an eavesdropper can snoop secret key as it is being exchanged. In Public-key encryption there is no key distribution problem; however, security relies on unproven mathematical assumptions such as the difficulty in factoring large integers. To overcome above mentioned limitations associated with both approaches, we have designed an approach to augment private key encryption with quantum key distribution. Experimental results showed that proposed approach outperforms better than existing approaches.
Index Terms:-
Ciphertext, Plaintext, AES, SHA, Quantum Key distribution (QKD)
REFERENCES
[1] Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, and Masahide Sasaki, “Highly Secure Network Switches with Quantum Key Distribution Systems”, International Journal of Network Security, Vol.17, No.1, PP.34–39, Jan. 2015.

[2] C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J. Schlafer, , and H. Yeh, “Current status of the DARPA quantum network,” in Quantum Information and Computation III, pp. 138–149. SPIE, 2005.

[3] Sanchez-Avilaf&R. Sanchez-Reillot,TheRijndael Block Cipher (AES Proposal): A Comparison with DES, Universidad Politecnica de Madrid, 28040 Madrid, Spain.

[4] TianqiZhou,JianShen ,XiongLi,Chen Wang and Jun Shen,”Quantum Cryptography for the Future Internet andthe Security Analysis”Chinese Academy of Sciences, Beijing, China3Hunan University of Science and Technology, Xiangtan,China.

[5] J. Aditya, P. Shankar Rao,” Quantum Cryptography” Dept of CSE, Andhra University,AndraPradesh,India.

[6] Richard J. Hughes,D. M. Alde, P. Dyer, G. G. Luther, G. L. Morgan and M. Schauer,”Quantum Cryptography” University of California Physics Division Los Alamos National Laboratory Los Alamos, NM 87545,USA.

[7] Mart Haitjema,”A Survey of the Prominent Quantum Key Distribution Protocols”University of Washington,USA.

[8] Alan Mink, Sheila Frankel and Ray Perlner,” Quantum Key Distribution (QKD) andCommodity Security Protocols: Introduction and Integration”National Institute of Standards and Technology (NIST),100 Bureau Dr., Gaithersburg, MD 20899.

[9] R. D. Sharma and A. De, “A new secure model for quantum key distribution protocol,” in Industrial and Information Systems (ICIIS), 2011 6th IEEE International Conference on. IEEE, 2011, pp. 462–466.

[10] N. S. Yanofsky and M. A. Mannucci, Quantum computing for computer scientists. Cambridge University Press Cambridge, 2008, vol. 20.

[11] M. D. H. Kulkarni, “Research directions in quantum cryptography and quantum key distribution,” International Journal of Scientific and Research Publications, vol. 2, no. 6, June 2012.


To view full paper, Download here


To View Full Paper

Publishing with