SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7190
QUANTUM KEY DISTRIBUTION
Roshini Murali Krishnan1, Suganthi. S 2, Vaishali. R3, Vidhya Prakash. R4
1,2,3,4Department of Computer Science and Engineering, R.M.K Engineering College, Tamil Nadu, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Protection power of key distribution of most
traditional cryptography relies on mathematical complexity
and the irrational time needed to break the algorithm.
However it will be ineffective if the secret key distribution
technique is susceptible. Quantum key distribution is an
innovative technique for dependable communication in
ever-evolving and more and more vulnerable surroundings.
In quantum key distribution, the secret key is generated by
means of using single particles of light (photon) and their
intrinsic quantum states to create an unbreakable
cryptosystem as an alternative of the use of numerical keys.
This key can be used with any public key encryption
algorithm to encrypt and decrypt a message which can be
sent over a well-known communication channel.
Keywords: Quantum Key Distribution, Middle-in-the-
man-attack, BB84 protocol, Advanced Encryption
Standards, Substitution Permutation Network
1. INTRODUCTION
Quantum Key Distribution is the technique of producing a
private key shared among two entities by using a quantum
channel and an authenticated classical channel (e.g., a
cellphone line). The private key can then be used to
encrypt a message which is sent over an classical channel
(along with internet connection). Contrast to conventional
cryptography where the security is typically based totally
on the fact that an opponent is not able to resolve a
particular mathematical problem, QKD achieves safety via
the laws of quantum physics. An eavesdropper trying to
intervene the quantum key exchange, will be detected as
he will leave some traces. In this case, the QKD protocol
ends the key generation.
1.1.1 UNCERTAINITY
In quantum mechanics, measurement is a major part, not
only an external method as in physics. It is far viable to
encode data into a few quantum properties of a photon so
that any attempt to track them always disturbs them in
some detectable way. The impact arises due to the fact in
quantum communication, certain physical properties of
photons are complementary within the sense that trying
to measure the properties of a particular photon always
disturbs the other photons. This is called Heisenberg
uncertainty principle. The two properties which might be
regularly utilized in quantum cryptography are two
photon polarization; rectilinear polarization (horizontal
and vertical) and diagonal polarization (45° and 135°).
1.1.2 MIDDLE-IN-THE- MAN-ATTACK
Man-in-the-middle attacks in quantum cryptography are
not possible due to Heisenberg's Uncertainty Principle. If
an intruder tries to intercept the photons, he will change
them if he uses the wrong detector. He cannot emit the
photons to Bob correctly again because it will introduce
unacceptable errors into the communication channel. If
entangled photons are used by Alice and Bob, then it is not
possible to attack these because emitting three entangled
photons would reduce the strength of each photon to such
a degree that it can be easily detected. Intruder cannot use
a man-in-the-middle attack, since he would have to
measure an entangled photon disrupting the other
photons and he would have to emit both photons again.
This is not possible to be done by the laws of quantum
physics. Other attacks might occur due to which fibre optic
line is required between the two points linked by quantum
cryptography. If it is possible to tamper with the
equipment used in quantum cryptography, it is possible to
generate keys that are not secure using a random number
generator attacks.
1.2 EXISTING SYSTEM
Modern key distribution techniques are practical and can
be done for any distance. Public key ciphers such as Diffie-
Hellman, RSA and ECC are used for exchanging symmetric
keys. Public-key cryptography or asymmetric
cryptography is an encryption scheme that makes use of
two mathematically related, but no longer equal keys - a
private key and a public key. Unlike symmetric key
algorithms that rely upon one key to each encrypt and
decrypt, every key performs a unique function .For
encryption these keys can be used, for instance with AES.
This key distribution technique offers a couple of
challenges. Its security is threatened by using random
number generators, new attack strategies, advances to
CPU power and the emergence of quantum computers.
Quantum computer systems will ultimately render a lot of
modern-day encryption dangers. A specific challenge is
that information encrypted today can be intercepted and
stored for decryption via quantum computer systems. The
primary quantum cryptography protocol defined a way to
use photon polarization states to transmit the secret key
through a quantum communication channel. This protocol
is the BB84 protocol and classified as prepare-and-
measure-based QKD protocol. BB84 protocol uses single
photon to transmit and distribute random bits to generate
the secret key.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7191
1.3. PROPOSED SYSTEM
In proposed system we use the QKD protocol and other
variant protocols which can be the recognized as secure
protocols. The QKD protocol includes four phases. The
first phase is the transmission of the randomly encoded
single photon circulation over the quantum channel from
Alice (the sender) to Bob (the receiver) to establish a
primary key. Alice continues a transient database of the
state of every photon sent. The second phase is shifting
where Bob sends the photons detected and their bases to
Alice over the classical channel. Bases refer to how the
photons have been measured. Photons may be encoded in
certainly one of bases (e.g., horizontal/vertical or diagonal
polarizations).If there is most effectively one photon then
only, one base can be implemented. If the photon base is
not measured properly, the value will be wrong. If it is far
measured within the incorrect base by the photon
detector, the generated value may be random. Alice keeps
in its database best of those entries obtained by Bob in the
proper base and sends this revised list again to Bob over
the classical channel. Bob retains those entries in his
revised listing. Alice and Bob now have an identical shared
key. These keys are of the same length however may
additionally have a few errors. That is referred to as
quantum bit error rate and it is due to eavesdropping. The
third phase is reconciliation to correct these errors. After
errors are removed the sender can send the information to
the receiver using the key.
2. SYSTEM DESIGN AND IMPLEMENTATION
2.1. QUANTUM KEY STATE TRANSMISSION
Essentially there are two types of QKD protocol schemes,
the first scheme is prepare-and-measure-based QKD
protocol and the second scheme is entanglement based
QKD protocol. The Alice has to put together the
information as polarized photon with the usage of photon
detectors and then the Bob ought to measure that photons
dispatched. Prepare-and-measure-based QKD protocol
using Heisenberg’s uncertainty principle in which it is not
possible to measure the quantum states without changing
its unique quantum state.
FIGURE 2.1 PHOTON TRANSMISSIONS
2.2. GENERATION OF RANDOM KEY
A Photon emitter is used to supply photons which are
polarized in four directions- horizontal, vertical, diagonal
left and diagonal right in which each photon can convert
one bit of information like vertical polarization for "0" and
horizontal polarization for "1" or right diagonal
polarization for "1" and left diagonal polarization for
"1".There are two detectors A for horizontal, vertical and
another detector B for diagonally polarized photons. The
photons randomly go through one of the detectors and the
photons are transformed to bits .If the photon become
detected via the incorrect detector the bit generated via
the photon is removed. All the last bits which were shaped
with the aid of the photons accomplishing correct
detectors shape the quantum key.
Figure 2.2. Generation of random key
2.3. ERROR CORRECTION
According no-cloning theorem, the quantum bit (qubit)
cannot be copied or amplified without changing them. This
mechanism allows the QKD system to detect the presence
of eavesdropper via the usage of the error parameter
during the transmission process of photons from Alice to
Bob. In the meantime, in entanglement-based QKD
protocol, Alice and Bob use entanglement photons
principle to distribute secret key.
Entanglement is the state of photons with correlated
physical properties. The entangled photons cannot be
defined by specifying the states of each particle and will
contain information such that it is not possible to obtain
information from a single particle. It is crucial for long
distance communication.
2.4. ENCRYPTION
Using the shared secret Key Alice can encrypt the message
using AES Encryption algorithm and transmit it to Bob. It
consists of three block ciphers: AES-128, AES-192 and
AES-256. The ciphers encrypt and decrypt information in
blocks of 128 bits by using cryptographic keys of 128-bits,
192-bits and 256-bits respectively. The Rijndael cipher
accepts extra block sizes and key lengths but it is not
followed in AES. Symmetric ciphers use the secret key for
encrypting and decrypting, so the sender and the receiver
should both recognize and use the identical secret key.
There are 10 rounds for 128-bit keys, 12 rounds for 192-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7192
bit keys and 14 rounds for 256-bit keys there are many
processing steps that consist of substitution, transposition
and combining of the enter plaintext and reworking it till
the very last output of cipher text. The AES encryption
defines some changes to be carried out on data in the form
of an array. Step one is to put the data into an array after
which the cipher alterations are repeated over some
encryption rounds. The number of rounds is determined
by the length of key-10 rounds for 128-bit keys, 12 rounds
for 192-bit keys and 14 rounds for 256-bit keys. The first
transformation in the AES encryption cipher is
substitution of information using a substitution table; the
second one transformation shifts records rows, the third is
mixing of columns. The final transformation is XOR
operation executed on every column using a distinctive
part of the encryption key. Longer keys need extra rounds
to finish.
2.5. DECRYPTION
Using shared secret key Bob decrypts the message. The
usage of AES decryption rules helps to view the plain text.
AES decryption involves transforming data Rijndael block
decipher algorithm to make it readable to those owning
unique knowledge, commonly referred to as a key. The
Encrypted records can only be deciphered if one has the
key . The decryption set of rules is a fixed of well described
steps to convert data from an unreadable format to a
decoded format. The end result of the process is decrypted
records, referred to as decipher text. AES decryption set of
regulations is an iterated block decipher set of rules with a
tough and speedy block length of 128 and a variable key
duration. The AES operates on 128 bits of data and
generates 128 bits of output. The period of the important
thing used to decrypt this enter records may be 128, 192
or 256 bits. AES has been designed as a SPN(Substitution-
Permutation Network) and decryption manner uses 10, 12
and 14 decryption rounds for key length of 128, 192 and
256 bits respectively.
CONCLUSION
Compared to the classical cryptography, probabilities of
data being intercepted and modified are extremely low in
quantum cryptography. QKD helps in generating secret
keys which is based on the rules of quantum physics. Key
sharing need a communication channel between the
entities which is costly. Quantum principles do not permit
to send keys to two or more different locations due to
which it requires separate channels between source and
many destinations. This is major disadvantage of quantum
communication through optical channel.
FUTURE WORK
Protection of QKD encryption system appears powerful
however it is still experimental and its first users outside
the research community are likely to be the ones for
whom safety is of greater importance than cost. QKD can
be used in network routes and offer Ethernet connections
for high-security communications. It can also be adopted
in government and industries for encrypting important
data.
REFERENCES
[1] Aakash Goyal, Sapna Aggarwal and Aanchal
Jain,”Quantum Cryptography & its Comparison
with Classical Cryptography: A Review Paper”, 5th
IEEE International Conference on Advanced
Computing & Communication Technologies [ICACCT-
2011] ISBN 81-87885-03-3
[2] Marcin Niemiec and Andrzej R. Pach, AGH University of
Science and Technology, ”Management of Security in
Quantum Cryptography”, published in IEEE
Communications Magazine August 2013
[3] Mehrdad Sharbaf, “Quantum Cryptography: A New
Generation of Information Technology Security
System”, 2009 Sixth International Conference on
Information Technology: New Generations
[4] Dr. PhysicsA, Quantum Mechanics Concepts: 1 Dirac
Notation and Photon Polarization, Published on Aug
20,
2013,Available:https://www.youtube.com/watch?v=p
Bh7Xqbh5JQ
[5] Dr. PhysicsA, Quantum Mechanics Concepts: 2 Photon
Polarization, Published on Aug 27, 2013,Part2 of a
series: continues photon polarization , Available
:https: //www.youtube. com /watch?v=zNMzUf5GZsQ
[6] V. Padmavathi, B. Vishnu Vardhan, A. V. N. Krishna,”
Quantum Cryptography and Quantum Key
Distribution Protocols: A Survey”, 2016 IEEE 6th
International Conference on Advanced Computing
Conference
[7] Stamatios V. Kartalopoulos, Williams Professor in
Telecommunications Networking,The University
of Oklahoma,” Chaotic Quantum Cryptography”, The
Fourth International Conference on Information
Assurance and Security
[8] W. K. Wootters and W. H. Zurek, “A Single Quantum
Cannot be Cloned”, Nature 299, 802-803, 1982.

More Related Content

What's hot

IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
 
Secret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environmentsSecret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environmentsMuthu Sybian
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
 
015 spins
015 spins015 spins
015 spinsSam Ram
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingRuwan Ranganath
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networkingsubhradeep mitra
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksIDES Editor
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Ericsson
 
Synchronous Security Authentication Report
Synchronous Security Authentication ReportSynchronous Security Authentication Report
Synchronous Security Authentication ReportSebastian W. Cheah
 
Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeIAEME Publication
 

What's hot (15)

IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
Secret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environmentsSecret key extraction from wireless signal strength in real environments
Secret key extraction from wireless signal strength in real environments
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
10307021
1030702110307021
10307021
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
 
680 684
680 684680 684
680 684
 
015 spins
015 spins015 spins
015 spins
 
Quantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin TossingQuantum Cryptography - Quantum Coin Tossing
Quantum Cryptography - Quantum Coin Tossing
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networking
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Synchronous Security Authentication Report
Synchronous Security Authentication ReportSynchronous Security Authentication Report
Synchronous Security Authentication Report
 
Securing tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchangeSecuring tesla broadcast protocol with diffie hellman key exchange
Securing tesla broadcast protocol with diffie hellman key exchange
 
Ppt taken workshoponwsn_withns2
Ppt taken workshoponwsn_withns2Ppt taken workshoponwsn_withns2
Ppt taken workshoponwsn_withns2
 

Similar to IRJET- Quantum Key Distribution

Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolIRJET Journal
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...IJNSA Journal
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpointijcisjournal
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxDaniel938043
 
B03250609
B03250609B03250609
B03250609theijes
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...ijcisjournal
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptographyShahzad Ahmad
 
Computer Vision-Based Early Fire Detection Using Machine Learning
Computer Vision-Based Early Fire Detection Using Machine LearningComputer Vision-Based Early Fire Detection Using Machine Learning
Computer Vision-Based Early Fire Detection Using Machine LearningIRJET Journal
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationYi-Hsueh Tsai
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyAndrew Manoske
 
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET Journal
 
Energetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor networkEnergetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor networkeSAT Journals
 
Energetic key for protected communication in wireless
Energetic key for protected communication in wirelessEnergetic key for protected communication in wireless
Energetic key for protected communication in wirelesseSAT Publishing House
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 

Similar to IRJET- Quantum Key Distribution (20)

1914 1917
1914 19171914 1917
1914 1917
 
2. 22796.pdf
2. 22796.pdf2. 22796.pdf
2. 22796.pdf
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
 
Quantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptxQuantum Cryptography & Key Distribution.pptx
Quantum Cryptography & Key Distribution.pptx
 
B03250609
B03250609B03250609
B03250609
 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
 
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
Compact Coding Using Multi-Photon Tolerant Quantum Protocols For Quantum Comm...
 
Ad26188191
Ad26188191Ad26188191
Ad26188191
 
Shahzad quantum cryptography
Shahzad quantum cryptographyShahzad quantum cryptography
Shahzad quantum cryptography
 
Computer Vision-Based Early Fire Detection Using Machine Learning
Computer Vision-Based Early Fire Detection Using Machine LearningComputer Vision-Based Early Fire Detection Using Machine Learning
Computer Vision-Based Early Fire Detection Using Machine Learning
 
Quantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and CommunicationQuantum Entanglement - Cryptography and Communication
Quantum Entanglement - Cryptography and Communication
 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
 
Energetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor networkEnergetic key for protected communication in wireless sensor network
Energetic key for protected communication in wireless sensor network
 
Energetic key for protected communication in wireless
Energetic key for protected communication in wirelessEnergetic key for protected communication in wireless
Energetic key for protected communication in wireless
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 

IRJET- Quantum Key Distribution

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7190 QUANTUM KEY DISTRIBUTION Roshini Murali Krishnan1, Suganthi. S 2, Vaishali. R3, Vidhya Prakash. R4 1,2,3,4Department of Computer Science and Engineering, R.M.K Engineering College, Tamil Nadu, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Protection power of key distribution of most traditional cryptography relies on mathematical complexity and the irrational time needed to break the algorithm. However it will be ineffective if the secret key distribution technique is susceptible. Quantum key distribution is an innovative technique for dependable communication in ever-evolving and more and more vulnerable surroundings. In quantum key distribution, the secret key is generated by means of using single particles of light (photon) and their intrinsic quantum states to create an unbreakable cryptosystem as an alternative of the use of numerical keys. This key can be used with any public key encryption algorithm to encrypt and decrypt a message which can be sent over a well-known communication channel. Keywords: Quantum Key Distribution, Middle-in-the- man-attack, BB84 protocol, Advanced Encryption Standards, Substitution Permutation Network 1. INTRODUCTION Quantum Key Distribution is the technique of producing a private key shared among two entities by using a quantum channel and an authenticated classical channel (e.g., a cellphone line). The private key can then be used to encrypt a message which is sent over an classical channel (along with internet connection). Contrast to conventional cryptography where the security is typically based totally on the fact that an opponent is not able to resolve a particular mathematical problem, QKD achieves safety via the laws of quantum physics. An eavesdropper trying to intervene the quantum key exchange, will be detected as he will leave some traces. In this case, the QKD protocol ends the key generation. 1.1.1 UNCERTAINITY In quantum mechanics, measurement is a major part, not only an external method as in physics. It is far viable to encode data into a few quantum properties of a photon so that any attempt to track them always disturbs them in some detectable way. The impact arises due to the fact in quantum communication, certain physical properties of photons are complementary within the sense that trying to measure the properties of a particular photon always disturbs the other photons. This is called Heisenberg uncertainty principle. The two properties which might be regularly utilized in quantum cryptography are two photon polarization; rectilinear polarization (horizontal and vertical) and diagonal polarization (45° and 135°). 1.1.2 MIDDLE-IN-THE- MAN-ATTACK Man-in-the-middle attacks in quantum cryptography are not possible due to Heisenberg's Uncertainty Principle. If an intruder tries to intercept the photons, he will change them if he uses the wrong detector. He cannot emit the photons to Bob correctly again because it will introduce unacceptable errors into the communication channel. If entangled photons are used by Alice and Bob, then it is not possible to attack these because emitting three entangled photons would reduce the strength of each photon to such a degree that it can be easily detected. Intruder cannot use a man-in-the-middle attack, since he would have to measure an entangled photon disrupting the other photons and he would have to emit both photons again. This is not possible to be done by the laws of quantum physics. Other attacks might occur due to which fibre optic line is required between the two points linked by quantum cryptography. If it is possible to tamper with the equipment used in quantum cryptography, it is possible to generate keys that are not secure using a random number generator attacks. 1.2 EXISTING SYSTEM Modern key distribution techniques are practical and can be done for any distance. Public key ciphers such as Diffie- Hellman, RSA and ECC are used for exchanging symmetric keys. Public-key cryptography or asymmetric cryptography is an encryption scheme that makes use of two mathematically related, but no longer equal keys - a private key and a public key. Unlike symmetric key algorithms that rely upon one key to each encrypt and decrypt, every key performs a unique function .For encryption these keys can be used, for instance with AES. This key distribution technique offers a couple of challenges. Its security is threatened by using random number generators, new attack strategies, advances to CPU power and the emergence of quantum computers. Quantum computer systems will ultimately render a lot of modern-day encryption dangers. A specific challenge is that information encrypted today can be intercepted and stored for decryption via quantum computer systems. The primary quantum cryptography protocol defined a way to use photon polarization states to transmit the secret key through a quantum communication channel. This protocol is the BB84 protocol and classified as prepare-and- measure-based QKD protocol. BB84 protocol uses single photon to transmit and distribute random bits to generate the secret key.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7191 1.3. PROPOSED SYSTEM In proposed system we use the QKD protocol and other variant protocols which can be the recognized as secure protocols. The QKD protocol includes four phases. The first phase is the transmission of the randomly encoded single photon circulation over the quantum channel from Alice (the sender) to Bob (the receiver) to establish a primary key. Alice continues a transient database of the state of every photon sent. The second phase is shifting where Bob sends the photons detected and their bases to Alice over the classical channel. Bases refer to how the photons have been measured. Photons may be encoded in certainly one of bases (e.g., horizontal/vertical or diagonal polarizations).If there is most effectively one photon then only, one base can be implemented. If the photon base is not measured properly, the value will be wrong. If it is far measured within the incorrect base by the photon detector, the generated value may be random. Alice keeps in its database best of those entries obtained by Bob in the proper base and sends this revised list again to Bob over the classical channel. Bob retains those entries in his revised listing. Alice and Bob now have an identical shared key. These keys are of the same length however may additionally have a few errors. That is referred to as quantum bit error rate and it is due to eavesdropping. The third phase is reconciliation to correct these errors. After errors are removed the sender can send the information to the receiver using the key. 2. SYSTEM DESIGN AND IMPLEMENTATION 2.1. QUANTUM KEY STATE TRANSMISSION Essentially there are two types of QKD protocol schemes, the first scheme is prepare-and-measure-based QKD protocol and the second scheme is entanglement based QKD protocol. The Alice has to put together the information as polarized photon with the usage of photon detectors and then the Bob ought to measure that photons dispatched. Prepare-and-measure-based QKD protocol using Heisenberg’s uncertainty principle in which it is not possible to measure the quantum states without changing its unique quantum state. FIGURE 2.1 PHOTON TRANSMISSIONS 2.2. GENERATION OF RANDOM KEY A Photon emitter is used to supply photons which are polarized in four directions- horizontal, vertical, diagonal left and diagonal right in which each photon can convert one bit of information like vertical polarization for "0" and horizontal polarization for "1" or right diagonal polarization for "1" and left diagonal polarization for "1".There are two detectors A for horizontal, vertical and another detector B for diagonally polarized photons. The photons randomly go through one of the detectors and the photons are transformed to bits .If the photon become detected via the incorrect detector the bit generated via the photon is removed. All the last bits which were shaped with the aid of the photons accomplishing correct detectors shape the quantum key. Figure 2.2. Generation of random key 2.3. ERROR CORRECTION According no-cloning theorem, the quantum bit (qubit) cannot be copied or amplified without changing them. This mechanism allows the QKD system to detect the presence of eavesdropper via the usage of the error parameter during the transmission process of photons from Alice to Bob. In the meantime, in entanglement-based QKD protocol, Alice and Bob use entanglement photons principle to distribute secret key. Entanglement is the state of photons with correlated physical properties. The entangled photons cannot be defined by specifying the states of each particle and will contain information such that it is not possible to obtain information from a single particle. It is crucial for long distance communication. 2.4. ENCRYPTION Using the shared secret Key Alice can encrypt the message using AES Encryption algorithm and transmit it to Bob. It consists of three block ciphers: AES-128, AES-192 and AES-256. The ciphers encrypt and decrypt information in blocks of 128 bits by using cryptographic keys of 128-bits, 192-bits and 256-bits respectively. The Rijndael cipher accepts extra block sizes and key lengths but it is not followed in AES. Symmetric ciphers use the secret key for encrypting and decrypting, so the sender and the receiver should both recognize and use the identical secret key. There are 10 rounds for 128-bit keys, 12 rounds for 192-
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7192 bit keys and 14 rounds for 256-bit keys there are many processing steps that consist of substitution, transposition and combining of the enter plaintext and reworking it till the very last output of cipher text. The AES encryption defines some changes to be carried out on data in the form of an array. Step one is to put the data into an array after which the cipher alterations are repeated over some encryption rounds. The number of rounds is determined by the length of key-10 rounds for 128-bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys. The first transformation in the AES encryption cipher is substitution of information using a substitution table; the second one transformation shifts records rows, the third is mixing of columns. The final transformation is XOR operation executed on every column using a distinctive part of the encryption key. Longer keys need extra rounds to finish. 2.5. DECRYPTION Using shared secret key Bob decrypts the message. The usage of AES decryption rules helps to view the plain text. AES decryption involves transforming data Rijndael block decipher algorithm to make it readable to those owning unique knowledge, commonly referred to as a key. The Encrypted records can only be deciphered if one has the key . The decryption set of rules is a fixed of well described steps to convert data from an unreadable format to a decoded format. The end result of the process is decrypted records, referred to as decipher text. AES decryption set of regulations is an iterated block decipher set of rules with a tough and speedy block length of 128 and a variable key duration. The AES operates on 128 bits of data and generates 128 bits of output. The period of the important thing used to decrypt this enter records may be 128, 192 or 256 bits. AES has been designed as a SPN(Substitution- Permutation Network) and decryption manner uses 10, 12 and 14 decryption rounds for key length of 128, 192 and 256 bits respectively. CONCLUSION Compared to the classical cryptography, probabilities of data being intercepted and modified are extremely low in quantum cryptography. QKD helps in generating secret keys which is based on the rules of quantum physics. Key sharing need a communication channel between the entities which is costly. Quantum principles do not permit to send keys to two or more different locations due to which it requires separate channels between source and many destinations. This is major disadvantage of quantum communication through optical channel. FUTURE WORK Protection of QKD encryption system appears powerful however it is still experimental and its first users outside the research community are likely to be the ones for whom safety is of greater importance than cost. QKD can be used in network routes and offer Ethernet connections for high-security communications. It can also be adopted in government and industries for encrypting important data. REFERENCES [1] Aakash Goyal, Sapna Aggarwal and Aanchal Jain,”Quantum Cryptography & its Comparison with Classical Cryptography: A Review Paper”, 5th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT- 2011] ISBN 81-87885-03-3 [2] Marcin Niemiec and Andrzej R. Pach, AGH University of Science and Technology, ”Management of Security in Quantum Cryptography”, published in IEEE Communications Magazine August 2013 [3] Mehrdad Sharbaf, “Quantum Cryptography: A New Generation of Information Technology Security System”, 2009 Sixth International Conference on Information Technology: New Generations [4] Dr. PhysicsA, Quantum Mechanics Concepts: 1 Dirac Notation and Photon Polarization, Published on Aug 20, 2013,Available:https://www.youtube.com/watch?v=p Bh7Xqbh5JQ [5] Dr. PhysicsA, Quantum Mechanics Concepts: 2 Photon Polarization, Published on Aug 27, 2013,Part2 of a series: continues photon polarization , Available :https: //www.youtube. com /watch?v=zNMzUf5GZsQ [6] V. Padmavathi, B. Vishnu Vardhan, A. V. N. Krishna,” Quantum Cryptography and Quantum Key Distribution Protocols: A Survey”, 2016 IEEE 6th International Conference on Advanced Computing Conference [7] Stamatios V. Kartalopoulos, Williams Professor in Telecommunications Networking,The University of Oklahoma,” Chaotic Quantum Cryptography”, The Fourth International Conference on Information Assurance and Security [8] W. K. Wootters and W. H. Zurek, “A Single Quantum Cannot be Cloned”, Nature 299, 802-803, 1982.