This document summarizes and compares several quantum key distribution protocols:
- BB84 protocol was the first protocol proposed in 1984 by Bennett and Brassard, using photon polarization in two bases to randomly encode bits.
- BBM92 protocol is a modified version using only two states instead of four.
- SARG04 protocol was proposed in 2004 and is more secure than BB84 in the presence of photon number splitting attacks.
- E91 protocol proposed in 1992 uses quantum entanglement of photon pairs, making it more secure than protocols based on Heisenberg's uncertainty principle.
- COW protocol from 2004 is experimentally simple and resistant to various attacks when using weak coherent pulses.
- DPS protocol encodes bits
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property
of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper.
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a
novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.
Neural Cryptography for Secret Key ExchangeIJMTST Journal
The goal of any cryptography system is the exchange of information among the intended user without any leakage of information to other who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive an identical input vector, generate an output bit and are trained based on the output bit. The two networks and their weights vectors exhibit a new phenomenon, where the networks synchronize to a state with identical time-dependent weights. The generated secret key over a public channel is used for encryption and decryption of the message or information send over the channel.
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
The research work focused on the future of the internet security transaction without allowing unauthorized user from accessing the secret document. The system was implemented with python flask framework been the lightest micro framework. The quantum key distribution generator model used is the BB84. Users can create account one the sender and other receiver then peered together in single communication channel. The sender attach file and send it in an encrypted manner to be received by receiver on presenting the same quantum key used for encrypting it. Once the eavesdropper click the link of the protocol, an alarm is raised and the system quantum key is change instantly and committed into the database. The other application is the Quantum Simulator, this application is used for generating a simulation for a quantum cryptography. Madubuezi Christian Okoronkwo | Onwuzo J. C | Gregory E. Anichebe "Quantum Cryptography Approach for Resolving Cyber Threats" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46458.pdf Paper URL : https://www.ijtsrd.com/computer-science/artificial-intelligence/46458/quantum-cryptography-approach-for-resolving-cyber-threats/madubuezi-christian-okoronkwo
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and
reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM
tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, RC5, RSA, ...) and chaos cryptography using continuous (Chau, Rossler, Lorenz, ...) or discreet (Logistics, Henon, ...) algorithms. The traditional algorithms have struggled to combat image data as compared to regular textual data. Whereas, the chaotic algorithms are more efficient for image ciphering. The Significancecharacteristics of chaos are its extreme sensitivity to initial conditions and algorithm parameters.
In this paper, medical image security based on hybrid/mixed chaotic algorithms is proposed. The proposed method is implemented using MATLAB. Where the image of the Retina of the Eye to detect Blood Vessels is ciphered. The Pseudo-Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented, and their statistical properties are evaluated using the National Institute of Standards and Technology NIST and other statistical test-suits. Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested. We propose two PRNGs to increase the complexity of the PRNGs and to allow many of the NIST statistical tests to be passed: one based on twohybrid mixed chaotic logistic maps and one based on two-hybrid mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side andstarts with random initial conditions and parameters (encryption keys). The resulting hybrid PRNGs passed many of the NIST statistical test suits.
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
DOTNET/JAVA/MATLAB/VLSI/NS2/EMBEDDED IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS FOR CSE/IT/ECE/EEE/ STUDENTS IN CHENNAI (S3 INFOTECH : 09884848198).
Final year IEEE 2014 projects for BE, BTech, ME, MTech &PHD Students (09884848198 : S3 Infotech)
Dear Students,
Greetings from S3 INFOTECH (0988 48 48 198). We are doing Final year (IEEE & APPLICATION) projects in DOTNET, JAVA, MATLAB, ANDROID, VLSI, NS2, EMBEDDED SYSTEMS and POWER ELECTRONICS.
For B.E, M.E, B.Tech, M.Tech, MCA, M.Sc, & PHD Students.
We implement your own IEEE concepts also in ALL Technologies. We are giving support for Journal Arrangement & Publication also.
Send your IEEE base paper to yes3info@gmail.com (or) info@s3computers.com.
To Register your project: www.s3computers.com
We are providing Projects in
• DOT NET
• JAVA / J2EE / J2ME
• EMBEDDED & POWER ELECTRONICS
• MATLAB
• NS2
• VLSI
• NETWORKING
• HADOOP / Bigdata
• Android
• PHP
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property
of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper.
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a
novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.
Neural Cryptography for Secret Key ExchangeIJMTST Journal
The goal of any cryptography system is the exchange of information among the intended user without any leakage of information to other who may have unauthorized access to it. A common secret key could be created over a public channel accessible to any opponent. Neural networks can be used to generate common secret key. In case of neural cryptography, both the communicating networks receive an identical input vector, generate an output bit and are trained based on the output bit. The two networks and their weights vectors exhibit a new phenomenon, where the networks synchronize to a state with identical time-dependent weights. The generated secret key over a public channel is used for encryption and decryption of the message or information send over the channel.
Quantum Cryptography Approach for Resolving Cyber Threatsijtsrd
The research work focused on the future of the internet security transaction without allowing unauthorized user from accessing the secret document. The system was implemented with python flask framework been the lightest micro framework. The quantum key distribution generator model used is the BB84. Users can create account one the sender and other receiver then peered together in single communication channel. The sender attach file and send it in an encrypted manner to be received by receiver on presenting the same quantum key used for encrypting it. Once the eavesdropper click the link of the protocol, an alarm is raised and the system quantum key is change instantly and committed into the database. The other application is the Quantum Simulator, this application is used for generating a simulation for a quantum cryptography. Madubuezi Christian Okoronkwo | Onwuzo J. C | Gregory E. Anichebe "Quantum Cryptography Approach for Resolving Cyber Threats" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-6 , October 2021, URL: https://www.ijtsrd.com/papers/ijtsrd46458.pdf Paper URL : https://www.ijtsrd.com/computer-science/artificial-intelligence/46458/quantum-cryptography-approach-for-resolving-cyber-threats/madubuezi-christian-okoronkwo
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and
reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM
tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, RC5, RSA, ...) and chaos cryptography using continuous (Chau, Rossler, Lorenz, ...) or discreet (Logistics, Henon, ...) algorithms. The traditional algorithms have struggled to combat image data as compared to regular textual data. Whereas, the chaotic algorithms are more efficient for image ciphering. The Significancecharacteristics of chaos are its extreme sensitivity to initial conditions and algorithm parameters.
In this paper, medical image security based on hybrid/mixed chaotic algorithms is proposed. The proposed method is implemented using MATLAB. Where the image of the Retina of the Eye to detect Blood Vessels is ciphered. The Pseudo-Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented, and their statistical properties are evaluated using the National Institute of Standards and Technology NIST and other statistical test-suits. Then, these algorithms are used to secure the data, where the statistical properties of the cipher-text are also tested. We propose two PRNGs to increase the complexity of the PRNGs and to allow many of the NIST statistical tests to be passed: one based on twohybrid mixed chaotic logistic maps and one based on two-hybrid mixed chaotic Henon maps, where each chaotic algorithm runs side-by-side andstarts with random initial conditions and parameters (encryption keys). The resulting hybrid PRNGs passed many of the NIST statistical test suits.
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
DOTNET/JAVA/MATLAB/VLSI/NS2/EMBEDDED IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS FOR CSE/IT/ECE/EEE/ STUDENTS IN CHENNAI (S3 INFOTECH : 09884848198).
Final year IEEE 2014 projects for BE, BTech, ME, MTech &PHD Students (09884848198 : S3 Infotech)
Dear Students,
Greetings from S3 INFOTECH (0988 48 48 198). We are doing Final year (IEEE & APPLICATION) projects in DOTNET, JAVA, MATLAB, ANDROID, VLSI, NS2, EMBEDDED SYSTEMS and POWER ELECTRONICS.
For B.E, M.E, B.Tech, M.Tech, MCA, M.Sc, & PHD Students.
We implement your own IEEE concepts also in ALL Technologies. We are giving support for Journal Arrangement & Publication also.
Send your IEEE base paper to yes3info@gmail.com (or) info@s3computers.com.
To Register your project: www.s3computers.com
We are providing Projects in
• DOT NET
• JAVA / J2EE / J2ME
• EMBEDDED & POWER ELECTRONICS
• MATLAB
• NS2
• VLSI
• NETWORKING
• HADOOP / Bigdata
• Android
• PHP
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing environments has put forth a question on the degree of security of such devices. Security being a unique challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory
problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an alternate security mechanism which is as hard as the existing number theoretic approaches. In this work, we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on high lattice dimension.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
A lightweight secure scheme for detecting provenance forgery and packet drop ...LeMeniz Infotech
A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
Wireless sensor network promises ubiquitous data
collection and processing for variety of commercial, healthcare
and military applications. Practical realization of WSN
applications is possible only after assuring network security.
Cryptographic key distribution is an important phase in
network security which establishes initial trust in the network.
Security protocol implementation in WSN is limited by
resource constrained nature of sensor nodes. The key
distribution algorithm satisfying security requirements of
given WSN application should be implemented with minimum
communication and memory overhead. As a solution to this
problem, hierarchical key management technique is proposed
in this paper. Symmetric key pre-distribution technique with
less computational overhead and ID-based asymmetric key
(IBK) distribution technique with less communication
overhead are applied simultaneously in the network at
different levels. Resilience strength and resource overhead of
the proposed scheme is compared with both symmetric and
asymmetric techniques.
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN’s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksIJERD Editor
One of the critical issues in WSNs is providing security for the secret data in military applications. It is necessary to ensure data integrity and authentication for the source data and secure end-to-end path for data transmission. Mobile sinks are suitable for data collection and localization. Mobile sinks and sensor nodes communicate with each other using their public identity, which is prone to security attacks like sink replication and node replication attack. In this work, we have proposed Source Encrypted Authentic Data algorithm (SEAD) that hides the location of mobile sink from malicious nodes. The sensed data is encrypted utilizing symmetric encryption ---Advanced Encryption Standards (AES) and tracks the location of the mobile sink. When data encounters a malicious node in a path, then data transmission path is diverted through a secure path. SEAD uses public encryption ---Elliptic Curve Cryptography (ECC) to verify the authenticity of the data. Simulation results show that the proposed algorithm ensures data integrity and node authenticity against malicious nodes. Double encryption in the proposed algorithm produces better results in comparison with the existing algorithms.
Creation of smart spaces and scaling of devices to achieve miniaturization in pervasive computing environments has put forth a question on the degree of security of such devices. Security being a unique challenge in such environments, solution demands scalability, access control, heterogeneity, trust. Most of the existing cryptographic solutions widely in use rely on the hardness of factorization and number theory
problems. With the increase in cryptanalytic attacks these schemes will soon become insecure. We need an alternate security mechanism which is as hard as the existing number theoretic approaches. In this work, we discuss the aspects of Lattice based cryptography as a new dimension of providing security whose strength lies in the hardness of lattice problems. We discuss about a cryptosystem whose security relies on high lattice dimension.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
A lightweight secure scheme for detecting provenance forgery and packet drop ...LeMeniz Infotech
A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
A broad variety of wireless data applications and services depend on security. This paper presents a
simulation-based study of a wireless communication system using a secured Vigenere cipher and the RSA
cryptographic algorithms on text message transmission. The system under consideration uses 1/2-rated
CRC channel coding and BPSK digital modulation over an Additive White Gaussian noise (AWGN)
channel. To address security concerns, a text message is encrypted at the transmitter with the Vigenere
cipher and RSA before being decrypted and compared for different levels of SNR at the receiver end. To
carry out the computer simulation, the Matlab 2016a programming language has been used. The
transmitted text message is successfully retrieved at the receiver end after the Vigenere cipher and the RSA
cryptographic algorithm are implemented. It is also anticipated that as noise power increases, the
effectiveness of a wireless communication system based on the Vigenere cipher and RSA security will
decrease.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
Wireless sensor network promises ubiquitous data
collection and processing for variety of commercial, healthcare
and military applications. Practical realization of WSN
applications is possible only after assuring network security.
Cryptographic key distribution is an important phase in
network security which establishes initial trust in the network.
Security protocol implementation in WSN is limited by
resource constrained nature of sensor nodes. The key
distribution algorithm satisfying security requirements of
given WSN application should be implemented with minimum
communication and memory overhead. As a solution to this
problem, hierarchical key management technique is proposed
in this paper. Symmetric key pre-distribution technique with
less computational overhead and ID-based asymmetric key
(IBK) distribution technique with less communication
overhead are applied simultaneously in the network at
different levels. Resilience strength and resource overhead of
the proposed scheme is compared with both symmetric and
asymmetric techniques.
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN’s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IMAGE ENCRYPTION TECHNIQUES USING FRACTAL FUNCTION: A REVIEWijcsit
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal
as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt
followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process.
Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
Framework for wireless network security using quantum cryptographyIJCNCJournal
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by
anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s
information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding
information as polarized photons, which can be sent through the air. This paper explores on the aspect of
application of quantum cryptography in wireless networks.
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness /complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATAijcisjournal
Modern cryptography targeted towards providing data confidentiality still pose some limitations. The security of public-key cryptography is based on unproven assumptions associated with the hardness complicatedness of certain mathematical problems. However, public-key cryptography is not unconditionally secure: there is no proof that the problems on which it is based are intractable or even that their complexity is not polynomial. Therefore, public-key cryptography is not immune to unexpectedly strong computational power or better cryptanalysis techniques. The strength of modern cryptography is being weakened and with advances of big data, could gradually be suppressed. Moreover, most of the currently used public-key cryptographic schemes could be cracked in polynomial time with a quantum computer. This paper presents a renewed focus in fortifying the confidentiality of big data by proposing a quantum-cryptographic protocol. A framework was constructed for realizing the protocol, considering some characteristics of big data and conceptualized using defined propositions and theorems.
Companies and government agencies are gaining access to encryption solutions based on quantum mechanics concepts.
https://sites.google.com/view/i-technolog/home
Artificial Intelligence and Quantum CryptographyPetar Radanliev
Abstract:
The technological advancements made in recent times, particularly in Artificial Intelligence (AI) and Quantum Computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where AI methodologies hold tremendous potential to enhance the efficiency and robustness of cryptographic systems. However, the emergence of quantum computers has created a new challenge for existing security algorithms, commonly called the 'quantum threat'. Despite these challenges, there are promising avenues for integrating neural network-based AI in cryptography, which has significant implications for future digital security paradigms. This summary highlights the key themes in the intersection of AI and quantum cryptography, including the potential benefits of AI-driven cryptography, the challenges that need to be addressed, and the prospects of this interdisciplinary research area.
Keywords: Artificial Intelligence, Quantum Algorithms, Neural Networks, Quantum-AI Integration, Quantum Threats, AI-enhanced Security, Quantum Information Processing.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Artificial Intelligence and Quantum CryptographyPetar Radanliev
Dr Petar Radanliev
Department of Computer Sciences
University of Oxford
Abstract:
The technological advancements made in recent times, particularly in Artificial Intelligence (AI) and Quantum Computing, have brought about significant changes in technology. These advancements have profoundly impacted quantum cryptography, a field where AI methodologies hold tremendous potential to enhance the efficiency and robustness of cryptographic systems. However, the emergence of quantum computers has created a new challenge for existing security algorithms, commonly called the 'quantum threat'. Despite these challenges, there are promising avenues for integrating neural network-based AI in cryptography, which has significant implications for future digital security paradigms. This summary highlights the key themes in the intersection of AI and quantum cryptography, including the potential benefits of AI-driven cryptography, the challenges that need to be addressed, and the prospects of this interdisciplinary research area.
Keywords: Artificial Intelligence, Quantum Algorithms, Neural Networks, Quantum-AI Integration, Quantum Threats, AI-enhanced Security, Quantum Information Processing.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
Exploring Quantum Cryptography: The Future of Unbreakable EncryptionPC Doctors NET
In an age where digital communication and data privacy are paramount concerns, the world of cryptography has been on a relentless quest to develop unbreakable encryption methods. The emergence of quantum cryptography has ignited a beacon of hope, promising a future where information can be secured with unparalleled certainty. In this article, we delve into the fascinating realm of quantum cryptography and how it is poised to reshape the landscape of data security.
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec and TLS. Pursuing a key exchange model, we propose how QKD could be integrated into these security applications. For such a QKD integration we propose a support layer that provides a set of common QKD services between the QKD protocol and the security applications.
2.espk external agent authentication and session key establishment using publ...EditorJST
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed and deployed in a un attend environment, these are vulnerable to numerous security threats. In this paper, describe the design and implementation of public-key-(PK)-based protocols that allow authentication and session key establishment between a sensor network and a third party. WSN have limitations on computational capacity, battery etc which provides scope for challenging problems. We fundamentally focused on the security issue of WSNs The proposed protocol is efficient and secure in compared to other public key based protocols in WSNs.
Wireless channel-based ciphering key generation: effect of aging and treatmentIJECEIAES
Key generation for data cryptography is vital in wireless communications secu- rity. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the ran- domness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this pa- per, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is de- veloped which decreases the correlation between keys generated at consecutive coherence times. When compared to the conventional method, the randomness improvement is significant at each time interval. The simulation results show that the proposed method improves the randomness of the encrypting keys.
Over the last twenty years, chaos-based encryption has been an increasingly popular way to encrypt and decrypt data using nonlinear dynamics and deterministic chaos. Discrete chaotic systems based on iterative maps have gotten a lot of interest because of their simplicity and speed. In this paper, three kinds of chaotic maps are utilized to build a digital image encryption strategy depending on a chaotic system. These chaotic maps are the logistic map, Arnold Cat’s map, and Baker’s map. In addition to using the triple data encryption standard (3DES) encryption scheme with the chaotic maps mentioned. The results of the experiments revealed that the suggested digital image encryption technique is both efficient and secure, making it ideal for usage in insecure networks. The transmission control protocol (TCP)/internet protocol (IP) protocol was used for the purpose of transferring data from server to client through the network and vice versa.
Similar to A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS (20)
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
1. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
DOI:10.5121/ijcsa.2017.7302 19
A SURVEY ON QUANTUM KEY
DISTRIBUTION PROTOCOLS
Jasleen Kour1
, Saboor Koul2
and Prince Zahid3
1
Assistant Professor, Department of CSE, BGSBU, Rajouri, J&K, India
2,3
UG Scholars, Department of CSE, BGSBU, Rajouri, J&K, India
ABSTRACT
Quantum cryptography is based on quantum mechanics to guarantee secure communication. It allows two
parties to produce a shared random bit string known only to them. These random bits can be used as a key
to encrypt and decrypt messages. The most important and unique property of quantum cryptography is the
ability of the two communicating users to detect the presence of any third party trying to gain knowledge of
the key. It is based on fundamental aspects of quantum mechanics. By using quantum entanglement or
quantum super positions and transmitting information in quantum states, a communication system can be
implemented which detects eavesdropping. Quantum cryptography is used to produce and distribute a key,
not to transmit any message data. This key along with certain encryption algorithm, is used to encrypt (and
decrypt) a message, which can then be transmitted over a standard communication channel. This paper
concentrates on comparison between classical and quantum cryptography as well as survey on various
quantum key distribution protocols used to generate and distribute the key among communicating parties.
KEYWORDS
Quantum Cryptography, QKD, bits, photons and qubits.
1. INTRODUCTION
Data communication security can be defined as complex process that implies networks, users and
applications, all of these connected by a set of modern technologies. So, Information systems are
very vulnerable to attacks and illegitimate penetrations, to data incidental or intended data.
Cryptography is a concept to protect the information transmission over such networks.
Cryptography is the science where the use of mathematics occurs to encrypt and decrypt data. It
enables user to store sensitive information or transmit it across insecure networks (like the
Internet) so that it cannot be interpreted by anyone other than the intended receiver. To achieve
such level of security different algorithms are used for secure transmissions which unite the
message with additional information to produce a cryptogram. These algorithms are known as
Cipher and the additional information is known as the key. This method is termed as encryption.
Whereas cryptanalysis is the science of analyzing and breaking secure communication without
knowing the encryption technique. Classical cryptanalysis involves an interesting combination of
analytical reasoning, pattern finding, patience, determination, and luck. Quantum cryptographic
devices generally make use of individual photons of light and take benefit of Heisenberg's
Uncertainty Principle, according to this principle cryptographic protocols can invoke up streams
of random bits whose values will remain unknown to third parties. When we use these bits as key
material for Vernam ciphers, we can get Shannon’s ideal of perfect secrecy—cheaply and easily.
The development of quantum cryptography was inspired by some limitations of classical
cryptography methods. In classical cryptography, communicating parties share a secret sequence
of random numbers, the key, that is exchanged by some physical mean and thus open to security
2. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
20
loopholes. The classical cryptography does not detect eavesdropping like quantum cryptography,
also with increase in computing power and new computational techniques are developed, the
numerical keys will no longer be able to provide satisfactory levels of secure communications.
These weaknesses led to the development of quantum cryptography, whose security basis is
quantum mechanics. This paper presents the comparison of quantum and classical cryptography
on several background, quantum cryptography key protocols and real world application of
quantum cryptography.
2. CLASSICAL V/S QUANTUM CRYPTOGRAPHY
Both quantum cryptography and classical cryptography can be compared on following
dimensions:
2.1. Fundamental Dimension
In theory, any classical private channel can be easily monitored inertly, without the knowledge to
sender or receiver that the eavesdropping has been done. Classical physics is the theory of
macroscopic bodies and phenomena such as radio signals that allows a physical property of an
object to be measured without disturbing other properties. Cryptographic key like information is
encoded in computable physical properties of some object or signal. Thus there is open possibility
of passive eavesdropping in classical cryptography.
Quantum theory which is basis of quantum cryptography is believed to direct all objects, but its
consequences are mainly noticeable in individual atoms or subatomic particles like microscopic
systems. As far as classical cryptography is concerned there is frequent requirement of using
longer keys as computational power doubles in every 18 months and cost of computation is
reducing rapidly with time [moors law]. Thus an algorithm using k bit key which is secure may
not be secure in future, i.e. it needs regular updating. On the other hand, security in quantum
cryptography is based on the basic principles of quantum mechanics, so the possibilities of major
changes requirements for future are almost negligible.
2.2. Commercial dimensions
Commercial solutions for QC that already exist; they are only suitable for point-to-point
connections. On the other hand, crypto chip made by the Siemens and Graz technical university
makes possible the creation of networks with many participants, and cost of €100,000 per unit,
the system is very expensive and requires a lot of work. On other hand classical cryptography can
be implemented in software and its cost for consumer is almost zero. Also, cryptographic system
based on classical cryptography can be implemented on small hardware component like smart
card , but this is major issue in case of quantum cryptography shrinkage to such a level require
too much development.
2.3. Technological dimensions
Chinese scientists accomplished the world`s most long-distance of quantum communication
transmission (teleportation), or as "instant matter transmission technology" technology. From the
China University of Technology and researchers at Tsinghua University, Hefei National
Laboratory in their free-space quantum communication experiments, and effectively enlarges the
communication distance to 10 miles [9]. But classical cryptography can be used to
communication distance of several million miles. According to the latest research, Toshiba
achieve new record bit rate for quantum key distribution, that is, 1 Mbit/s on average [10]. On the
other hand the bit rate of classical cryptography depends on the computational power largely.
3. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
21
2.4. Other dimensions
Communication medium is not an issue in classical cryptography because its security depends
only on the computational complexity. Thus, this removes the need for excessively secure
channels. On the other hand communication of quantum cryptography require a quantum channel
like optical fiber or through air (wireless), also, there is constantly a likelihood of modification in
polarization of photon due to Birefringence effect or rough paths that cause change in refractive
index due to damage sometimes. Also, an n-bit classical register can store at any moment exactly
one n-bit string. Whereas an n-qubit quantum register can store at any moment a superposition of
all 2n n-bit strings.
Quantum cryptography is based on mixture of concepts from quantum physics and information
theory. The security standard in QC is based on theorems in classical information theory and on
the Heisenberg’s uncertainty principle. Experiments have demonstrated that keys can be
exchanged over distances of a few miles at low bit rate. Its combination with classical secret key
cryptographic algorithms permits increasing the confidentiality of data transmissions to an
extraordinary high level. From comparison, it’s obvious that quantum cryptography (QC) is
having more advantage than Classical Cryptography (CC) though some issues are yet to be
solved. This is mainly due to the implementation problems but in future there exist possibilities
that most of the problems in quantum cryptography will get resolved.
3. QUANTUM KEY DISTRIBUTION PROTOCOLS
Quantum key distribution is a key establishment protocol which generates symmetric key
material by using quantum properties of light to transfer information from one Client to another
Client in a manner which uses the results of quantum mechanics. By using the quantum
properties of light, current lasers, fibre-optics and free space transmission technology can be used
for QKD (Quantum key distribution), so that many observers claiming security can be based on
the law of quantum physics only. Based upon the necessary principles of Quantum mechanics the
QKD protocols are divided into two categories some are based on Heisenberg Uncertainty
Principles and others are based on quantum entanglement.
3.1. Protocols based on Heisenberg Uncertainty Principle:
3.1.1. BB84 protocol
In 1984 Charles Bennet and Gilles Brassard for the first time proposed a protocol known as BB84
protocol which depends upon the Heisenberg Uncertainty principle.
Quantum key Distribution (QKD) is used in quantum cryptography for generating a secret key
shared between two parties using a quantum channel and an authenticated classical channel. The
private key obtained then used to encrypt message that are sent over an insecure channel (such as
a conventional internet connection) as shown fig. below .A bit can be represented by polarising
the photon in either of the two bases i.e. Rectilinear base(R) and Diagonal base (B).Binary 0
represents the polarisation of 0° degree in rectilinear base or 45° degree in diagonal base.
Similarly binary 1 represents the polarisation of 90° degree in the rectilinear base or 135° degree
in diagonal base. [1][5][15][16]
4. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
22
Figure 1A. Quantum cryptographic communication System for securely transferring Random key.
There are two steps involved in key distribution for BB84 protocol, as explained below:
a) One way communication channel (via quantum channel).
Step i) User A (Alice) randomly chosen polarized photon and send it to the user B (Bob) over
Quantum channel.
Step ii) In this, user B receives photons using random basis either rectilinear or random.
b) Two way communication (via classical channel).
Step i) User A will use classical channel to inform user B about the polarisation A chose for
every bit sent to B without disclosing the bit value.
Step ii) Now user will compare the polarisation sequence he receives from user A with the
sequence he generated.
Step iii) Bits of same orientation of those two sequences can be used as secret key.
3.1.2. BBM92 protocol
It is the modified version of BB84 protocol which uses only two states instead of four states
which were used in BB84 protocol. Charles Bennett, Brassard and Mermin devised another, the
so-called BBM92 protocol. They realized that it was not necessary to use two orthogonal bases
for encoding and decoding. It turns out that a single non-orthogonal basis can be used instead,
without affecting the security of the protocol against eavesdropping. This idea is used in the
BB92 protocol, which is otherwise identical to BB84 protocol.
Fig 1B: BB92 protocol state encoding
5. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
23
As shown in fig 1B. BB92 above, 0 represents 0°degree in the rectilinear basis and 1 represents
45°degree in the diagonal basis. Client A transmits string of photons to client B which were
encrypted by randomly chosen bits just like in BB84 protocol. But here client A chooses the bits
by an authoritative rule to which base client B must use. But still Client B chooses randomly a
basis by which to measure but if Client B chooses wrong base he will not measure anything; a
condition in quantum mechanics which is known as an erasure. After every step Client B tells
Client A that the bits end by client A whether or not he measured it correctly.[2][3][7]
3.1.3. SARG04 protocol
SARG04 protocol was proposed by Scarani et.al in 2004. In this protocol the four states of BB84
protocol is used with different information such a new protocol is developed which is capable of
performing without failure under a wide range of conditions when attenuated laser pulses instead
of single photon source.
Its first phase is similar to BB84 protocol. In the second Phase Client A instead of directly
announcing her base to Client B, it announces a pair of non-orthogonal states one of which client
A uses it to encode its bit. Client B measures the correct state if it has used the correct base.
Client B will not be able to determine the bit or will not measure the correct states of client A if
he chooses the wrong base. The length the key will remain ¼ of the raw key after shifting stage if
there are no errors.
The SARG04 protocol has almost same security to BB84 in perfect single-photon
implementations, If the quantum channel is of a given visibility (i.e. with losses) then the QBER
of SARG04 is twice that of BB84 protocol, and is more sensitive to losses.SARG04 is more
secure than BB84 protocol in presence of PNS attacks.[1][4][5][14]
Fig 2A: Poincare sphere
3.2. Protocols based on Quantum Entanglement.
3.2.1 E91 protocol
Ekert, in 1992, performed the process of key distribution through entanglement of photons in a
quantum channel. He proposed a method of harnessing Bell`s inequalities. In this method any of
the three, A (Alice), B (Bob), or the third party could produce entangled photons. Separation in
each pair is such that the communicants, A and B could receive one of each pair. Quantum
6. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
24
entanglement means to define the quantum states of one object without referencing the quantum
states of another object far away from it. The fact that entangled states are used conceals the
information about the key from the eavesdroppers, hence more secure method. The states of
particle are not collapsed until the moment of measurement, so trying to access the system is as
looking for something that doesn`t exist yet.
Both A and B choose randomly and independently from two different orientations of their
analysers to measure the polarization of photons. A typically physical set-up is shown in fig3A:
given below, using active polarization rotators (PR), polarizing beam splitter (PBS) and
avalanche photodiodes (APD). [8][11][13]
Fig 3A: Typical System Using Entangled Photon Pairs
3.2.2. COW protocol
A new protocol, given by Nicolas Gisin et al in 2004, was proposed for QKD based on the weak
coherent pulses at high bit rates. The protocol was termed as Coherent One-Way protocol l(COW
protocol). The main feature of the method was the setup being experimentally simple and
resistant to interference visibility and to photon numbers splitting attacks, hence more efficient in
terms of distilled secret bits per qubit.
Fig4A: Scheme of the COW protocol.
The figure 4A above represents the COW protocol. The message is encoded in time. Alice sends
Coherent pulses that are either empty or have a mean photon number μ < 1. Each logical bit of
information is encoded by sequences of two pulses, μ-0 for a logical ―0‖ or 0-μ for a logical
―1‖.
Alice sends decoy sequences μ-μ for security needs. Bob measures the arrival time of the photon
on his data-line, detector DB to obtain its key. Bob randomly measure the coherence between
successive non-empty pulses, bit sequence ―1 -0‖ or decoy sequence, with interferometer and
detectors DM1 and DM2. If wavelength of the laser and the phase in the interferometer are well
aligned, we have all detection on DM1 and no detection on DM2. A loss of coherence and
7. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
25
therefore a reduction of the visibility reveal the presence of an eavesdropper, in which case the
key is simply discarded, hence no information will be lost.[1][11][12][7]
3.2.3. DPS protocol
Differential –phase-shift QKD (DPS-QKD) is a new quantum key distribution scheme that was
proposed by K. Inoue et al. Figure 5A mentioned below shows the setup of the DPS-QKD
scheme.
Fig 5A: Schematic diagram of DPS protocol
From the Alice site, a pulse train of weak coherent states is phase-modulated randomly by {0, π}
for every pulse and then to Bob with an average photon number less than one per pulse. From the
Bob`s site, the phase difference is measured between the two sequential pulses using one bit
delay. Mach-Zender interferometer and photon detectors record the photon arrival time and which
detector clicked. Bob, after transmission of the optical pulse train, tells Alice the time at which
photon was counted. Alice comes to know from this time information and her modulation data
about the detector clicked at Bob`s site. Under an agreement that a click by detector 1 denotes
―0‖ and click by detector 2 denotes ―1‖, for example Alice and Bob obtain an identical bit
string.
The DPS-QKD scheme has certain advantageous features including a simple configuration,
efficient time domain use, and robustness against photon number splitting attack. [9][10][11]
4. APPLICATIONS OF QUANTUM CRYPTOGRAPHY
The study of quantum cryptography is heavily application-oriented. Therefore, a fundamental
question is: Who really needs it rather than classical cryptography? The most significant
advantage of quantum cryptography is the forward security. That is, if a classified message is
appropriately encrypted with quantum cryptography, its distribution will stay secure as long as
quantum mechanics is valid. In contrast, a classified message that is encrypted with classical
cryptographic algorithm may stay safe only for a certain period of time. The length of this ―secure
period‖ is predictable only if the increase of computational power is predictable. Quantum
cryptography can be a favored choice for applications that require long-term information security.
There can be a long list of potential (or maybe present) clients. Here we raise a few examples.
8. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
26
4.1. Government agencies.
This includes intelligence, diplomatic, and military agencies. Often under the name of national
interest, some information (like some pictures taken in Guantanamo Bay detention camp) is
expected to be kept confidential for decades, during which such confidential information may be
extensively distributed among different government agencies. Note that the Canadian census data
are kept secret for 92 years. Therefore, if we conducted a census in 2009, the data would not be
released until 2101, which is the next century! Quantum cryptography can help keep these
sensitive data secure during transmission.
4.2. Financial institutes.
Financial information is very sensitive and needs long-time confidentiality. Quantum encrypted
links between financial institutes can substantially reduce the risk of leaking the clients’
information during communication.
4.3. Health care providers.
Health care records are being digitized gradually. Digital records of patients are often distributed
between different health care providers facilitate medical treatments. The distribution of a
patient’s health record may have to be kept secure for the life span of the patient, and quantum
cryptography can certainly be of help. Note that quantum cryptography is not the only method to
guarantee unconditional communication security. It is not even the only solution to the key
distribution problem.
5. CONCLUSION & FUTURE WORK
The techniques adapted from classical computer science are applicable to quantum key
distribution protocols is an appropriate sign that quantum cryptography is a rousing new area of
research work. In this paper we endeavored to introduce quantum cryptography, QKD protocols
and QC applications. It explains about different quantum key distribution protocols. These
protocols can be used along with encryption technique to achieve higher level of security. There
is much more to describe about quantum cryptography
REFERENCES
[1] Abhishek Parakh, (2015), ―New Protocol for Quantum Public Key Cryptography‖, IEEE ANTS 2015
1570203267 .
[2] Otilia Cangea, Carmen Silvia Oprina, Mihai-Octavian Dima, (2016), ―Implementing Quantum
Cryptography Algorithms for Data Security‖ ,ECAI 2016 - International Conference – 8th Edition
Electronics, Computers and Artificial Intelligence 30 June -02 July, 2016, Ploiesti, ROMÂNIA.
[3] V. Padamvathi, B. Vishnu Vardhan, A.V.N. Krishna,(2016), ―Quantum Cryptography and Quantum
Key Distribution Protocols: A Survey‖, Advanced Computing (IACC), 2016 IEEE 6th International
Conference.
[4] H. Bennett, (May 1992),‖Quantum cryptography using any two no orthogonal states‖,‖ Phys. Rev.
Lett., vol. 68, no. 21, pp. 3121–3124,.
[5] Tamaki, K., M. Koashi, and N. Imoto, (2003), ―Unconditionally secure key distribution based on two
non orthogonal states‖,‖ Physical Review Letters 90, 167904 [preprint quant-ph/0210162].
[6] M. Christandl, R. Renner, and A. Ekert, (Mar. 2004 ), ―A generic security proof for quantum key
distribution‖,‖ arXiv:quant-ph/0402131.
9. International Journal on Computational Science & Applications (IJCSA) Vol.7, No.1/2/3, June 2017
27
[7] M. A. Nielsen and I. L. Chuang, (2000), ―Quantum Computation and Quantum Information‖,
Cambridge, UK: Cambridge University Press.
[8] Eduin H. Serna, (2009), ―Quantum Key Distribution Protocol with Private-Public Key‖‖, Quantum
Physics (quant-ph), http://arxiv.org/PS_cache/arxiv/pdf/0908/0908.2146v3.pdf.
[9] E. Biham, T. Mor, (1997), ―Security of quantum cryptography against collective attacks‖, Physical
Review Letters 78 (11) 2256–2259.
[10] Ekert, Artur K.,( August 1991), ―Quantum cryptography based on Bell’s theorem, Physical Review
Letters‖, Vol. 67, No. 6, 5, pp 661 - 663.
[11] Inoue K, Woks E and Yamamoto Y, (2002), ―Differential phase shift quantum key distribution‖,
Phys. Rev. Lett. 89037902.
[12] M. Lucamarini, S. Mancini, (2005), ―Secure deterministic communication without entanglement,
Physics Review Letters‖, 94140501.
[13] M. Elboukhari, M. Azizi, A. Azizi, (2009), ―Implementation of secure key distribution based on
quantum cryptography‖‖, in Proc. IEEE Int. Conf Multimedia Computing and Systems (ICMCS’09),
pp 361 – 365.
[14] M. Elboukhari, Mostafa Azizi, and Abdelmalek Azizi, (2009), ―Integration of Quantum Key
Distribution in the TLS Protocol‖‖, IJCSNS, Vol. 9 No. 12 , pp.21-28,.
http://paper.ijcsns.org/07_book/200912/20091204.pdf.
[15] N. Lutkenhaus, (1996), ―Security against eavesdropping in quantum cryptography, Physical Review‖,
A 54 (1) 97–111.
[16] P. W. Shor and J. Preskill,( July 2000), ―Simple proof of security of the BB84 quantum key
distribution protocol‖, Phys. Rev. Lett, vol. 85, no. 2, pp. 441– 444.
[17] R.Hughes,J.Nordholt,D.Derkacs,C.Peterson, (2002), ―Practical free-space quantum key distribution
over 10km in daylight and at night‖, New journal of physics 4 (2002)43.1-43.14.URL:
http://www.iop.org/EJ/abstract/1367-2630/4/1/343.
[18] C. H. Bennett and G. Brassard, (1984), ―Quantum cryptography: Public key distribution and coin
tossing,‖ in Proc. IEEE Intl. Conf. on Computers, Systems, and Signal Processing, pp. 175–179.
[19] U. Vazirani and T. Vidick, (Sep 2014), ―Fully device-independent quantum key distribution.‖, Phys.
Rev. Lett., 113:140501,.
[20] S.-A. Wang and C.-Y. Lu.( Aug 2013), ―Quantum secure direct communication network In
Nanotechnology (IEEE-NANO)‖, 13th IEEE Conference, pp 752–755.
[21] Verma Deepankar, Kour Jasleen, (June 2014), ―Image Steganography Based on Hybrid Cryptography
Algorithm Designed by making use of Blowfish, AES, RSA Algorithm‖, IJARCSSE, Vol. 4, Issue 6.