Improving BB84 in Quantum Encryption

Elaheh Golzardi

Abstract


Today, information security plays a key role in communications and exchanges. Until now Various approaches including: Quantum encryption and Quantum key Distribution (QKD), have been utilized for information security, that act based on Quantum Mechanic principles, so that if one tries to hear the information, it will be detected via increasing error rate in receiver part. BB84 is one of secure algorithms in quantum encryption area, bearing less error rate in comparison to other quantum algorithms. The goal of the paper is to improve the algorithms as much as possible in order to defend the attacks. We use a hybrid key to accomplish the task in which we add authentication and time limit beside the QKD key.

Keywords


Quantum Cryptography (QC), Quantum Key Distribution (QKD), Hybrid Key.

Full Text:

PDF

References


A. M. Shaikha, and P. D. Shah, BB84 and Identity Based Encryption (IBE) Based a Novel Symmetric Key

Distribution Algorithm, Elsevier journal, 2012.

A. Mahmoud Abbas, A, Goneid, and Sh, El-Kassas, Privacy Amplification in Quantum Cryptography BB84 using

Combined Univarsal2-Truly Random Hashing, International Journal of Information and Network Security (IJINS),

(2)98-115, 2014.

B. Santhi, K.S. Ravichandran, A. P. Arun, and L. Chakkarapani, A Novel Cryptographic Key Generation Method

Using Image Features, Research Journal of Information Technology, 4(2), pp. 88-92, 2012.

B. Tanmay, H. Sirshendu, M. Ayan, and S. R. Bhadra Chaudhuri, A novel data encryption technique by genetic

crossover of robust biometric key and session based password, International. J. Network Secur. Appl. (IJNSA), 3(2),

pp. 111-120, 2011.

C. Bennet, and G. Brassard, Quantum cryptography, IEEE. International Conference on computer. System and

processing. Bangalore. India. N.Y, p175, 1992.

C. Bennet, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum Cryptography, Journal of

cryptography, 1992.

C. Elliot, and D. Pearson, Quantum Cryptography in Practice, IEEE, optics letter, vol. 91, NO.6, PP 35-40, 2003.

C. Kollmitzer, and M. Pivk, Applied Quantum Cryptography, Springer, 2010.

D. N. Kartheek, O. P. Kumar, and S. Srujan, Security Using BB84 Quantum Key Distribution Protocols. IJARCSSE

All Rights Reserved, 2012.

H. Schildt, The Complete Reference Java, Seventh Edition, McGraw-Hill, 2007.

J. Katz, Digital Signatures, 1st ed, 2nd Printing, pp. 3-33 & 87-119, 2010.

M. R. Ogiela, and L. Ogiela, Image based cryptobiometric key generation, Third International Conference

on Intelligent Networking and Collaborative Systems (INCoS), AGH Univ. Sci. Technol, Krakow, Poland, pp. 673-

, 2011.

N.V. Chetty, B. Abhijith, G. Nihar, and P. M. D. Raj Vincent, Modified Novel Quantum Key Exchange using

BB84 Algorithm, International Journal of Engineering and Technology, 5(3)2451-2454, 2013.

P. Marrand, and D. Townsend, Quantum key distribution over distance as long as 30km, vol. 20, no.15, pp.

-1697, 1995.

R. Ursin, Entanglement-based quantum communication over 144km, Nature Physics, pp. 481-486, 2007.

S. Fengxi, G. Zhongwei, M. Dayong, Feature Selection Using Principal Component Analysis, ICSEM, 1:

-30, 2010.

W. Lifang, L. Xingsheng, Y. Songlong, and X. Peng, A novel key generation cryptosystem based on face

features, IEEE 10th International Conference on Signal Processing, pp. 1675-1678, 2010.

Y. Jeong, Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols,

Department of Physics, Pohang University of Science and Technology (POSTECH), Pohang, 790-784, Korea. February

, 2010.

Y. Kai-zhi, C. Ying-lei, and J. Liu, A method for extracting the text feature of SAR image based on cooccurrence matrix, 4th International Congress on Image and Signal Processing (CISP), Telecommun. Eng. Inst., Air Force Eng. Univ., Xi'an, China, 4: 2038-2043, 2011.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2015 Journal of Information Sciences and Computing Technologies

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

 

Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.

ISSN: 2394-9066

For any help/support contact us at jiscteditor@scitecresearch.com.