Quantum cryptography is a method for accessing data with the cryptosystem more efficiently. The network security and the cryptography are the two major properties in securing the data in the communication network. The quantum cryptography uses the single photon passing through the polarization of a photon. In Quantum Cryptography, it's impossible for the eavesdropper to copy or modify the encrypted messages in the quantum states in which we are sending through the optical fiber channels. Cryptography performed by using the protocols BB84 and B92 protocols. The two basic algorithms of quantum cryptography are Shor’s algorithm and the Grover’s’s algorithm. For finding the number of integer factorization of each photon, Shor’s algorithm is used. Grover’s’s algorithm used for searching the unsorted data. Shor’s algorithm overcomes RSA algorithm by high security. By the implementation of quantum cryptography, we are securing the information from the eavesdropper and thereby preventing data in the communication channel.
Quantum cryptography uses principles of quantum mechanics to securely distribute encryption keys between two parties. It allows Alice and Bob to detect if an eavesdropper (Eve) is trying to intercept the key during transmission. Eve's attempt to measure the quantum states used to transmit the key would introduce detectable errors. The document discusses the history and principles of quantum cryptography, including types like discrete and continuous variable QKD. It also covers desirable attributes like confidentiality and rapid key delivery, providing an example of how quantum key distribution works between Alice and Bob.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
Seminar Report on Quantum Key DistributionShahrikh Khan
This document is a seminar report submitted by Shahrukh A. Khan to the Department of Computer Engineering at SSBT's College of Engineering and Technology in partial fulfillment of the requirements for a Bachelor of Engineering degree. The report discusses quantum key distribution, with sections introducing classical cryptography, reviewing related work, describing the methodology used, discussing implementation and applications, and concluding. The report was completed under the guidance of Mr. M.E. Patil in 2015.
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
This document describes a new technique called GSMLPSA for secure group key exchange and encryption in wireless communication. It uses a multilayer perceptron neural network to generate a session key shared between parties. Plaintext is encrypted in multiple levels using a metamorphosed code table, comparison-based encryption, and a keystream generated by simulated annealing. The keystream is further encrypted using a finite state automaton before being XORed with the session key and sent. This allows secure key exchange among a group of parties with only logarithmic complexity. Experimental results show the technique provides comparable security to existing methods.
Quantum cryptography a modern cryptographic securityKamal Diwakar
This document provides an overview of quantum cryptography. It begins with introductions to traditional cryptography and quantum cryptography. Quantum cryptography relies on principles of quantum mechanics like the Heisenberg uncertainty principle and photon polarization to securely distribute keys. It explains that quantum key distribution is needed because secure key distribution is not possible with traditional communications, but is possible using quantum communications. The document then discusses why quantum cryptography is needed, what problem quantum key distribution solves, and that deploying quantum key distribution systems is not complex. It also outlines two types of quantum cryptography - position-based and post-quantum cryptography. Finally, it provides an example of an existing quantum network and concludes that quantum cryptography could be the first application of quantum mechanics at the single particle level
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
This document discusses quantum cryptography. It begins with an introduction to traditional cryptography and then defines quantum cryptography as exploiting quantum mechanical properties like the Heisenberg uncertainty principle and quantum entanglement for cryptographic tasks. It explains how quantum cryptography works by having Alice and Bob send polarized photons in randomly chosen bases and discarding mismatched bases to generate a secret key. It also covers applications like secure online voting and satellite communications, as well as limitations such as short maximum distances and inability to multiplex quantum channels.
Quantum cryptography uses principles of quantum mechanics to securely distribute encryption keys between two parties. It allows Alice and Bob to detect if an eavesdropper (Eve) is trying to intercept the key during transmission. Eve's attempt to measure the quantum states used to transmit the key would introduce detectable errors. The document discusses the history and principles of quantum cryptography, including types like discrete and continuous variable QKD. It also covers desirable attributes like confidentiality and rapid key delivery, providing an example of how quantum key distribution works between Alice and Bob.
A brief presentation on Position-Based, Device-Independent and Post Quantum Cryptographies. Detailing Position-Based QC, defining Device-Independent QC and discussing Post Device-Independent.
Seminar Report on Quantum Key DistributionShahrikh Khan
This document is a seminar report submitted by Shahrukh A. Khan to the Department of Computer Engineering at SSBT's College of Engineering and Technology in partial fulfillment of the requirements for a Bachelor of Engineering degree. The report discusses quantum key distribution, with sections introducing classical cryptography, reviewing related work, describing the methodology used, discussing implementation and applications, and concluding. The report was completed under the guidance of Mr. M.E. Patil in 2015.
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
This document describes a new technique called GSMLPSA for secure group key exchange and encryption in wireless communication. It uses a multilayer perceptron neural network to generate a session key shared between parties. Plaintext is encrypted in multiple levels using a metamorphosed code table, comparison-based encryption, and a keystream generated by simulated annealing. The keystream is further encrypted using a finite state automaton before being XORed with the session key and sent. This allows secure key exchange among a group of parties with only logarithmic complexity. Experimental results show the technique provides comparable security to existing methods.
Quantum cryptography a modern cryptographic securityKamal Diwakar
This document provides an overview of quantum cryptography. It begins with introductions to traditional cryptography and quantum cryptography. Quantum cryptography relies on principles of quantum mechanics like the Heisenberg uncertainty principle and photon polarization to securely distribute keys. It explains that quantum key distribution is needed because secure key distribution is not possible with traditional communications, but is possible using quantum communications. The document then discusses why quantum cryptography is needed, what problem quantum key distribution solves, and that deploying quantum key distribution systems is not complex. It also outlines two types of quantum cryptography - position-based and post-quantum cryptography. Finally, it provides an example of an existing quantum network and concludes that quantum cryptography could be the first application of quantum mechanics at the single particle level
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented to simulate a communication channel with compression techniques. The method aims to address issues with inverting the Hill cipher's multiplicative matrix by using periodically repeating matrices.
This document discusses quantum cryptography. It begins with an introduction to traditional cryptography and then defines quantum cryptography as exploiting quantum mechanical properties like the Heisenberg uncertainty principle and quantum entanglement for cryptographic tasks. It explains how quantum cryptography works by having Alice and Bob send polarized photons in randomly chosen bases and discarding mismatched bases to generate a secret key. It also covers applications like secure online voting and satellite communications, as well as limitations such as short maximum distances and inability to multiplex quantum channels.
Naman Kumar presented on the topic of quantum cryptography. The presentation covered basic cryptography terms and techniques like encryption, decryption, and public key cryptography. It then discussed quantum key distribution and how it uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute encryption keys. The popular BB84 protocol was explained, which uses photon polarization to randomly generate and securely transmit encryption keys. Quantum cryptography provides unhackable secure communication up to 50km but has high setup costs. It could allow for perfectly secure transactions and communications in the future.
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
This document evaluates the performance of chaotic encryption algorithms. It aims to analyze the confidentiality, integrity, and efficiency of encrypting video data. The document introduces cryptography and chaos concepts. It describes chaotic encryption and decryption processes. It evaluates existing algorithms like CVES, SEA, NCA, and EES based on encryption speed, CPU utilization, and power consumption. The results show that CVES and NCA have better encryption speeds while EES requires more time. The algorithms provide varying levels of security from high to middle.
Quantum cryptography provides a secure way to exchange encryption keys. It uses principles of quantum mechanics like photon polarization and the uncertainty principle to detect eavesdropping. The most common protocol is BB84, where Alice encodes random bits in one of four polarization states and Bob measures them randomly. They compare bases to detect errors from eavesdropping. If no errors, the bits form a shared encryption key known only to them. Quantum key distribution exploits these effects to securely generate encryption keys between two parties.
Quantum cryptography uses properties of quantum mechanics to securely distribute encryption keys. It allows two users to generate a shared secret key with information-theoretic security. This is accomplished through quantum key distribution, which exploits the quantum mechanical principle that measuring a quantum system can disturb the system. Even if an eavesdropper has unlimited computing power, the laws of physics guarantee the security of the key exchange. The paper introduces cryptography, traditional techniques, and the differences between traditional and quantum cryptography.
This document outlines a presentation on quantum key distribution. The presentation covers an introduction to cryptography, classical cryptography techniques like the one-time pad, quantum cryptography concepts like photon polarization, and quantum key distribution protocols like BB84. Quantum key distribution allows two parties to detect an eavesdropper attempting to gain knowledge of an encrypted key by exploiting quantum effects. The document provides context and details for each topic that will be covered in the presentation.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
This document summarizes a research paper on a Probabilistic Data Encryption Scheme (PDES). The paper presents a probabilistic encryption scheme that combines the security of Goldwasser and Micali's probabilistic encryption with the efficiency of deterministic schemes. The scheme is based on the assumption that solving the quadratic residuacity problem is computationally infeasible without knowing the factorization of the composite integer. An example is provided to illustrate how the encryption and decryption algorithms work using quadratic residues modulo a composite integer. The paper concludes that the scheme provides semantic security similar to Goldwasser-Micali under the assumption that the quadratic residuacity problem is hard.
This document provides an introduction to quantum cryptography. It explains that quantum cryptography uses principles of quantum mechanics like quantum entanglement and the Heisenberg uncertainty principle to securely distribute encryption keys. It notes that quantum cryptography combines the concepts of one-time pads and quantum key distribution, using quantum mechanics to detect any attempts at eavesdropping. The document also briefly discusses the history of cryptography, how quantum key distribution works, advantages and disadvantages of quantum cryptography, and its future applications.
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network.
However, COPE leaves risks for attackers easily getting the private information saved in the packets,
when they move through the network to their destination nodes. Hence, a lightweight cryptographic approach,
namely SCOPE, was proposed to consolidate COPE against the honest-but-curious and malicious
attacks. Honest-but-curious attack serves adversaries who accurately obey the protocol but try to learn as
much private information as possible for their curiosity. Additionally, this kind of attack is not destructive
consequently. However, it may leave the backdoor for the more dangerous attacks carrying catastrophes
to the system. Malicious attack tries to learn not only the private information but also modifies the packet
on harmful purposes. To cope with this issue, in this work, a lightweight cryptographic approach improves
COPE, namely SCOPE, that is defensive to the both attacks. The private information in the COPE packet
are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE
packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm
(ECDSA). We then prove our new protocol is still guaranteed to be a secure method of data coding,
and to be light to effectively operate in the peer-to-peer wireless network.
The document proposes a novel secure scheme for computing the cosine similarity between two integer vectors with malicious adversaries. The scheme uses distributed ElGamal encryption and zero-knowledge proofs to privately compute the cosine coefficient between two parties' vector inputs while preserving privacy. Security analysis shows the scheme can resist attacks from malicious adversaries by simulating the ideal functionality using the encryption scheme and zero-knowledge proofs.
Quantum cryptography uses principles of quantum mechanics to guarantee secure communication. It allows two parties to generate a shared random key that can be used to encrypt and decrypt messages. There are two main approaches - using polarized photons or entangled photons. Information reconciliation and privacy amplification protocols are used to ensure the keys between the two parties are identical and an eavesdropper gains no information. While traditional man-in-the-middle attacks are impossible, future work aims to increase transmission distances including to satellites. Several research groups and companies are conducting research on quantum cryptography.
This document provides an introduction to quantum cryptography. It discusses how quantum cryptography solves the key distribution problem faced by conventional cryptography through the use of polarized photons and quantum properties like the Heisenberg uncertainty principle. The document summarizes the BB84 quantum key distribution protocol developed by Bennett and Brassard, in which Alice and Bob use randomly polarized photons to generate an encryption key. It also discusses some challenges for practical quantum cryptography implementations, like developing single photon sources and detectors and transmitting photons over long distances.
1) Quantum key distribution uses quantum entanglement to securely distribute encryption keys between two parties. By measuring entangled quantum states, Alice and Bob can generate a shared random key that an eavesdropper cannot determine without introducing errors.
2) Specifically, the document describes a protocol where Alice and Bob share many entangled photon pairs and randomly measure each photon in either the X or Z basis. Their measurement outcomes will be perfectly correlated when measured in the same basis but random when measured in different bases.
3) This protocol allows Alice and Bob to detect any eavesdropping by Eve, as it would introduce errors in their measurement outcomes. With the secure random key, they can then communicate privately via the one-time pad
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
The document analyzes the secrecy and performance of symmetric key encryption algorithms including block ciphers (DES, TripleDES, AES), stream ciphers (RC2, RC4) and hybrid algorithms combining block and stream ciphers (TripleDES+RC4, AES+RC4). The analysis is conducted based on two measurement criteria (secrecy of ciphers and encryption time) under two circumstances (variable input plaintext size and variable input plaintext length representing passwords). Results are presented in a table showing average secrecy values for each algorithm over varying input data sizes. The tool created allows users to select an algorithm and see corresponding performance and secrecy results.
This document discusses the implementation of a hybrid cryptography algorithm combining DES and IDEA. It begins by providing background on encryption, key escrow schemes, and the need for stronger algorithms. It then separately describes DES and IDEA, including their structure, performance analysis, and types of cryptanalysis attacks they are susceptible to. The document proposes a new hybrid algorithm combining DES and IDEA to improve security and integrity.
This document summarizes quantum cryptography and the BB84 protocol. It discusses how quantum cryptography can securely transmit encryption keys using quantum properties like photon polarization. The BB84 protocol, developed in 1984 by Bennett and Brassard, was the first quantum cryptographic protocol and is based on generating secret keys for encryption via single photon polarization or entanglement. It ensures detection of eavesdropping during key distribution through disturbance of quantum data from listening.
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
This document proposes a novel key distribution scheme for visual cryptography. It begins with an introduction to cryptography and visual cryptography. It then describes the existing Diffie-Hellman key exchange algorithm. The proposed method generates a shared secret key through a multi-step process using asymmetric key cryptography and modulus operation on private keys and a public image. Both parties are able to derive the same symmetric key for encrypting future communications without directly transmitting their private keys. The methodology and implementation details are provided, along with experimental results demonstrating the generation of matching keys within 0.11 seconds on average.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
This document summarizes a research paper that proposes a new hybrid text encryption approach combining elliptic curve cryptography and the Hill cipher algorithm for use on mobile ad hoc networks. The approach aims to address security weaknesses in the Hill cipher by converting it from a symmetric to an asymmetric technique. It generates public and private keys using elliptic curve cryptography so the secret key does not need to be shared over unsecured channels. The approach also allows direct encryption and decryption of characters from the full 128-character ASCII table using their numeric values, avoiding the need for a character mapping table. The advantages are seen as improved security, efficiency and faster computation compared to other techniques.
1. The document presents an audio watermarking algorithm based on discrete wavelet transform and least significant bit insertion (DWT-LSB). The DWT decomposes the audio signal into sub-bands to identify locations for embedding watermark bits. The watermark bits are embedded in the high-resolution sub-band using LSB insertion.
2. Testing showed SNR values between 53.7-59.6 dB for different audio signals, indicating imperceptibility of the embedded watermark. The DWT-LSB method provides satisfactory robustness and imperceptibility for audio watermarking.
3. Digital watermarking techniques like the one proposed can help protect copyright of digital audio by embedding invisible signatures as
Naman Kumar presented on the topic of quantum cryptography. The presentation covered basic cryptography terms and techniques like encryption, decryption, and public key cryptography. It then discussed quantum key distribution and how it uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute encryption keys. The popular BB84 protocol was explained, which uses photon polarization to randomly generate and securely transmit encryption keys. Quantum cryptography provides unhackable secure communication up to 50km but has high setup costs. It could allow for perfectly secure transactions and communications in the future.
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
This document evaluates the performance of chaotic encryption algorithms. It aims to analyze the confidentiality, integrity, and efficiency of encrypting video data. The document introduces cryptography and chaos concepts. It describes chaotic encryption and decryption processes. It evaluates existing algorithms like CVES, SEA, NCA, and EES based on encryption speed, CPU utilization, and power consumption. The results show that CVES and NCA have better encryption speeds while EES requires more time. The algorithms provide varying levels of security from high to middle.
Quantum cryptography provides a secure way to exchange encryption keys. It uses principles of quantum mechanics like photon polarization and the uncertainty principle to detect eavesdropping. The most common protocol is BB84, where Alice encodes random bits in one of four polarization states and Bob measures them randomly. They compare bases to detect errors from eavesdropping. If no errors, the bits form a shared encryption key known only to them. Quantum key distribution exploits these effects to securely generate encryption keys between two parties.
Quantum cryptography uses properties of quantum mechanics to securely distribute encryption keys. It allows two users to generate a shared secret key with information-theoretic security. This is accomplished through quantum key distribution, which exploits the quantum mechanical principle that measuring a quantum system can disturb the system. Even if an eavesdropper has unlimited computing power, the laws of physics guarantee the security of the key exchange. The paper introduces cryptography, traditional techniques, and the differences between traditional and quantum cryptography.
This document outlines a presentation on quantum key distribution. The presentation covers an introduction to cryptography, classical cryptography techniques like the one-time pad, quantum cryptography concepts like photon polarization, and quantum key distribution protocols like BB84. Quantum key distribution allows two parties to detect an eavesdropper attempting to gain knowledge of an encrypted key by exploiting quantum effects. The document provides context and details for each topic that will be covered in the presentation.
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
Elliptic curve cryptography (ECC) is an effective approach to protect privacy and security of information. Encryption
provides only one level of security during transmission over the channel. Hence there is a need for a stronger encryption which is very
hard to break. So, to achieve better results and improve security, information has to pass through several levels of encryption. The aim
of this paper would be to provide two levels of security. First level comprises of plaintext using as security key compressed block to
encrypt text based ECC technique and the second level comprises of scrambling method with compression using 2D Cellular rules. In
particular, we propose an efficient encryption algorithm based ECC using Cellular automata and it is termed as Elliptic Curve
Cryptosystem based Cellular Automata (ECCCA). This paper presents the implementation of ECCCA for communication over
insecure channel. The results are provided to show the encryption performance of the proposed method.
This document summarizes a research paper on a Probabilistic Data Encryption Scheme (PDES). The paper presents a probabilistic encryption scheme that combines the security of Goldwasser and Micali's probabilistic encryption with the efficiency of deterministic schemes. The scheme is based on the assumption that solving the quadratic residuacity problem is computationally infeasible without knowing the factorization of the composite integer. An example is provided to illustrate how the encryption and decryption algorithms work using quadratic residues modulo a composite integer. The paper concludes that the scheme provides semantic security similar to Goldwasser-Micali under the assumption that the quadratic residuacity problem is hard.
This document provides an introduction to quantum cryptography. It explains that quantum cryptography uses principles of quantum mechanics like quantum entanglement and the Heisenberg uncertainty principle to securely distribute encryption keys. It notes that quantum cryptography combines the concepts of one-time pads and quantum key distribution, using quantum mechanics to detect any attempts at eavesdropping. The document also briefly discusses the history of cryptography, how quantum key distribution works, advantages and disadvantages of quantum cryptography, and its future applications.
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network.
However, COPE leaves risks for attackers easily getting the private information saved in the packets,
when they move through the network to their destination nodes. Hence, a lightweight cryptographic approach,
namely SCOPE, was proposed to consolidate COPE against the honest-but-curious and malicious
attacks. Honest-but-curious attack serves adversaries who accurately obey the protocol but try to learn as
much private information as possible for their curiosity. Additionally, this kind of attack is not destructive
consequently. However, it may leave the backdoor for the more dangerous attacks carrying catastrophes
to the system. Malicious attack tries to learn not only the private information but also modifies the packet
on harmful purposes. To cope with this issue, in this work, a lightweight cryptographic approach improves
COPE, namely SCOPE, that is defensive to the both attacks. The private information in the COPE packet
are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE
packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm
(ECDSA). We then prove our new protocol is still guaranteed to be a secure method of data coding,
and to be light to effectively operate in the peer-to-peer wireless network.
The document proposes a novel secure scheme for computing the cosine similarity between two integer vectors with malicious adversaries. The scheme uses distributed ElGamal encryption and zero-knowledge proofs to privately compute the cosine coefficient between two parties' vector inputs while preserving privacy. Security analysis shows the scheme can resist attacks from malicious adversaries by simulating the ideal functionality using the encryption scheme and zero-knowledge proofs.
Quantum cryptography uses principles of quantum mechanics to guarantee secure communication. It allows two parties to generate a shared random key that can be used to encrypt and decrypt messages. There are two main approaches - using polarized photons or entangled photons. Information reconciliation and privacy amplification protocols are used to ensure the keys between the two parties are identical and an eavesdropper gains no information. While traditional man-in-the-middle attacks are impossible, future work aims to increase transmission distances including to satellites. Several research groups and companies are conducting research on quantum cryptography.
This document provides an introduction to quantum cryptography. It discusses how quantum cryptography solves the key distribution problem faced by conventional cryptography through the use of polarized photons and quantum properties like the Heisenberg uncertainty principle. The document summarizes the BB84 quantum key distribution protocol developed by Bennett and Brassard, in which Alice and Bob use randomly polarized photons to generate an encryption key. It also discusses some challenges for practical quantum cryptography implementations, like developing single photon sources and detectors and transmitting photons over long distances.
1) Quantum key distribution uses quantum entanglement to securely distribute encryption keys between two parties. By measuring entangled quantum states, Alice and Bob can generate a shared random key that an eavesdropper cannot determine without introducing errors.
2) Specifically, the document describes a protocol where Alice and Bob share many entangled photon pairs and randomly measure each photon in either the X or Z basis. Their measurement outcomes will be perfectly correlated when measured in the same basis but random when measured in different bases.
3) This protocol allows Alice and Bob to detect any eavesdropping by Eve, as it would introduce errors in their measurement outcomes. With the secure random key, they can then communicate privately via the one-time pad
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
The document analyzes the secrecy and performance of symmetric key encryption algorithms including block ciphers (DES, TripleDES, AES), stream ciphers (RC2, RC4) and hybrid algorithms combining block and stream ciphers (TripleDES+RC4, AES+RC4). The analysis is conducted based on two measurement criteria (secrecy of ciphers and encryption time) under two circumstances (variable input plaintext size and variable input plaintext length representing passwords). Results are presented in a table showing average secrecy values for each algorithm over varying input data sizes. The tool created allows users to select an algorithm and see corresponding performance and secrecy results.
This document discusses the implementation of a hybrid cryptography algorithm combining DES and IDEA. It begins by providing background on encryption, key escrow schemes, and the need for stronger algorithms. It then separately describes DES and IDEA, including their structure, performance analysis, and types of cryptanalysis attacks they are susceptible to. The document proposes a new hybrid algorithm combining DES and IDEA to improve security and integrity.
This document summarizes quantum cryptography and the BB84 protocol. It discusses how quantum cryptography can securely transmit encryption keys using quantum properties like photon polarization. The BB84 protocol, developed in 1984 by Bennett and Brassard, was the first quantum cryptographic protocol and is based on generating secret keys for encryption via single photon polarization or entanglement. It ensures detection of eavesdropping during key distribution through disturbance of quantum data from listening.
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
This document proposes a novel key distribution scheme for visual cryptography. It begins with an introduction to cryptography and visual cryptography. It then describes the existing Diffie-Hellman key exchange algorithm. The proposed method generates a shared secret key through a multi-step process using asymmetric key cryptography and modulus operation on private keys and a public image. Both parties are able to derive the same symmetric key for encrypting future communications without directly transmitting their private keys. The methodology and implementation details are provided, along with experimental results demonstrating the generation of matching keys within 0.11 seconds on average.
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
This document summarizes a research paper on using elliptic curve cryptography for message authentication. It begins with an introduction to elliptic curve cryptography and how it can provide equivalent security to other public key encryption methods but with smaller key sizes. It then describes the proposed methodology which includes generating an ECC key pair, encrypting a message with the public key, transmitting the encrypted message, and decrypting it with the private key. The results show a message being encrypted and decrypted correctly using this ECC process. It concludes that ECC can provide an efficient method for authentication in systems like vehicular networks due to its lower computation and communication overhead compared to other encryption methods.
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
This document summarizes a research paper that proposes a new hybrid text encryption approach combining elliptic curve cryptography and the Hill cipher algorithm for use on mobile ad hoc networks. The approach aims to address security weaknesses in the Hill cipher by converting it from a symmetric to an asymmetric technique. It generates public and private keys using elliptic curve cryptography so the secret key does not need to be shared over unsecured channels. The approach also allows direct encryption and decryption of characters from the full 128-character ASCII table using their numeric values, avoiding the need for a character mapping table. The advantages are seen as improved security, efficiency and faster computation compared to other techniques.
1. The document presents an audio watermarking algorithm based on discrete wavelet transform and least significant bit insertion (DWT-LSB). The DWT decomposes the audio signal into sub-bands to identify locations for embedding watermark bits. The watermark bits are embedded in the high-resolution sub-band using LSB insertion.
2. Testing showed SNR values between 53.7-59.6 dB for different audio signals, indicating imperceptibility of the embedded watermark. The DWT-LSB method provides satisfactory robustness and imperceptibility for audio watermarking.
3. Digital watermarking techniques like the one proposed can help protect copyright of digital audio by embedding invisible signatures as
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
The astonishing developments have been occurring in the field of network communications for a long time and
these advancement lead to a genuine and conspicuous need of image transfer and getting safely through the web.
The web is not secure for the exchange of dependable data, for example, content, picture and video.
Cryptographic procedures are vital to be improved to exchange data through web safely. Routine cryptography,
for example, AES, DES, IDEA and RSA includes simply rearranging of pixels and henceforth will prompt
decreased security for information protection. With a specific end goal to enhance the security, it is important to
expand the intricacy in encryption. As an answer for this it is proposed to utilize confused maps in encryption
methods which expand the multifaceted nature. As intricacy builds, data security increments. Thus, chaos-based
encryption has its own significance in providing security for secret information i.e. data confidentiality than
conventional.
This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
This document discusses quantum cryptography and its advantages over traditional cryptography. It begins by introducing cryptography and its goal of maintaining confidentiality of data. It then describes how quantum cryptography uses principles of quantum mechanics like photon polarization and Heisenberg's uncertainty principle to securely distribute keys. The document reviews existing quantum cryptography protocols like BB84 and E91. It also discusses challenges in technologies for generating and detecting single photons needed for quantum cryptography. In conclusion, the document explains how quantum cryptography provides secure key distribution using physics rather than mathematics, making it more secure than other cryptographic techniques.
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
The document describes a thesis submitted by Amogh Mahapatra and Rajballav Dash for their Bachelor of Technology degree. It examines using the Hill cipher technique and self-repetitive matrices for data encryption and decryption. Specifically, it proposes an innovation to the conventional Hill cipher method using the concept of self-repetitive matrices. This approach is mathematically derived and implemented using code to simulate a communication channel with compression techniques. The method aims to address issues with the Hill cipher by making it more difficult to crack through choosing an appropriate block size and modular index for the self-repetitive matrix.
11.secure data transmission by using steganographyAlexander Decker
This document summarizes a research paper that proposes a system for secure data transmission using steganography and cryptography. The system encrypts secret data using elliptic curve cryptography before embedding it in unused fields of the TCP/IP header to create a covert channel. This allows for covert transmission of encrypted data over a communication channel in a way that is not detectable by third parties. The paper reviews related work on using network protocols for steganography and discusses applying the proposed system to applications like secure file transfers and network auditing.
This document discusses using steganography and cryptography together to securely transmit data over a network. It proposes hiding encrypted data in unused fields of TCP/IP packet headers, creating a covert channel. Specifically, the secret message would be encrypted, embedded into a carrier file like an image to create a "stego object." This object would then be divided into packets and hidden in the TCP sequence number, option fields, IP type of service, or identification fields before transmission. By encrypting the message and using steganography, the transmission would be secure and covert, avoiding detection by third parties.
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
This document summarizes and compares several quantum key distribution protocols:
- BB84 protocol was the first protocol proposed in 1984 by Bennett and Brassard, using photon polarization in two bases to randomly encode bits.
- BBM92 protocol is a modified version using only two states instead of four.
- SARG04 protocol was proposed in 2004 and is more secure than BB84 in the presence of photon number splitting attacks.
- E91 protocol proposed in 1992 uses quantum entanglement of photon pairs, making it more secure than protocols based on Heisenberg's uncertainty principle.
- COW protocol from 2004 is experimentally simple and resistant to various attacks when using weak coherent pulses.
- DPS protocol encodes bits
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
This document provides an overview of an Nt1310 Unit 6 Powerpoint presentation with the following key points:
1. The setup phase takes in a security parameter and selects a bilinear group with generator b. It selects attributes, exponents, and generates public and master keys.
2. The key generation phase takes a set of attributes as input and produces a secret key equivalent to those attributes. It selects a random number and calculates the key.
3. The encryption phase is not described in detail in this excerpt.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
Abstract: Elliptic Curve Cryptography (ECC) plays an important role in today’s public key based security
systems. . ECC is a faster and more secure method of encryption as compared to other Public Key
Cryptographic algorithms. This paper focuses on the performance advantages of using ECC in the wireless
network. So in this paper its algorithm has been implemented and analyzed for various bit length inputs. The
Private key is known only to sender and receiver and hence data transmission is secure.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
The chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image
encryption techniques. In this paper an algorithm for encryption & decryption of digital image using chaotic logistic map and
Arnold cat map is discussed. The algorithm utilizes the good features of chaotic sequence related to cryptographic properties,
such as pseudo-random, sensitivity to initial conditions and aperiodicity. The algorithm use logistic mapping to confusion the
location of pixels in a digital image & Arnold cat map parameters are to be considered as secret keys for securing an image.
Due to change of any secret keys the system produces undesired results at the receiver side. Finally experimental results along
with statistical analysis including histogram analysis and correlation property show that presented algorithm has good desirable
cryptography properties and is more secure technique against the unauthorized person.
encryption techniques. In this paper an algorithm for encryption & decryption of digital image using chaotic logistic map and
Arnold cat map is discussed. The algorithm utilizes the good features of chaotic sequence related to cryptographic properties,
such as pseudo-random, sensitivity to initial conditions and aperiodicity. The algorithm use logistic mapping to confusion the
location of pixels in a digital image & Arnold cat map parameters are to be considered as secret keys for securing an image.
Due to change of any secret keys the system produces undesired results at the receiver side. Finally experimental results along
with statistical analysis including histogram analysis and correlation property show that presented algorithm has good desirable
cryptography properties and is more secure technique against the unauthorized person.
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
Similar to Quantum cryptography for secured communication networks (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 407 - 414
408
The QC is dependent on the two steps of 20th hundred, the quantum physics in the Heisenberg
Uncertainty sense of right and the sense of right photon that moves to opposite positions. Quantum
cryptography gives answer to, way out of the full of force hard question of narrow way safety and can
electric button offfacts sending (power and so on), when that attacks takes place.
In harmony with the sense of [9] the Heisenberg uncertainty, it is impossible for measuring
the Quantum states without troubling most of the system. In this way, the movement of the opposite positions
of a photon addition to start or end of word experienced at the point. This makes certain attackers intrusion
should give that cannot changed back in the states of the quantum prior they are sent to the one who gets.
The property that quantum cryptography has is the no-cloning property. It explains that is
impossible to get the copy of the single photon that are not given access the word that one is going to other
users. The movement to opposite positions photon sense of right gives a detailed account of light photons that
how it can be the adjustment to events or gave opposites in special ways.
To send the unknown quantum news given far away from light quantum, by whom it has existence
the mixed position doing by the use of quantum mixed positions Moreover, the structure that is taken
the quantum news given in the place without sent to the user.
2. CRYPTOGRAPGY
The art of writing a level stretch of teaching book into the cipher teaching book. The uncommon,
note is made to a rule put into signs experienced as cipher teaching book. The process of getting changed
from level stretch of teaching book to cipher teaching book are experienced as enciphering or process of
changing knowledge into a secret form and putting back to earlier position the level stretch of teaching book
from cipher teaching form are experienced as deciphering. The two types of cryptography, symmetric
cryptography and the other is asymmetric cryptography.
2.1. Symmetric
The person who sends as well as the person who receives the data, utilizes the key and the same
algorithm to do the cryptography. Assume that, A encrypts a level stretch of teaching book note with the key
as well as B decrypts the note where Alice uses both the key and the algorithm. The keys are kept secretly, in
which that only A and B have knowledge of it [8]. As an outcome of that, the best direction for having the
algorithm and the secret keys in the channel are requested. In the asymmetric, it is started to get answer to the
distribution of the keys with the hard question like symmetric [10]. Greatly respected like in size algorithms
has the facts form quality example Triple DES (3des) and the Advanced Encryption Standard (AES).
2.2. Asymmetric
The process of changing the knowledge into a secret form, with which the pair of the keys involved.
All the users will have their exact public and the private keys. Let us assume that, if B tries to encrypt
the facts, A will share key of public with B, later B can encrypt the facts by using A’s key [8]. Now, B likes
to share the encrypted facts with A, then A is allowed to decrypt the facts by using the key of private.
This is how, encryption of the facts by the private and the user with the public key has the access to
decryptthe facts.
3. FACTORIZATION PROBLEM
Making the discovery of the root amounts hard question of RSA cryptosystem. The public key
which is used as RSA algorithm [11]. The RSA overcomes the trouble by first in rating of the numbers that
are prime. Pelzl and Paar, according to them the asymmetric algorithms and the RSA that were in place of
symmetric algorithms are not used. The main usage of the RSA algorithm is for the safest mechanism for
the key exchange and mostly used with the like algorithms like Advanced Encryption Standard (AES).
The like in size algorithm does the true, in fact the process of changing knowledge into a secret form and
process of changing knowledge back into starting form careful way. Kirsch, the author illustrated, RSA is
based on reasoning opento attack, if a tightly process of doing the factorization introduces the ability in
the currently existence. The knowledge processing machines [11], named Quantum- Computer.
4. DISCRETE LOGARITHM PROBLEM
In the cryptography problems, Elliptic Curve Cryptography and the Diffie Hellman [7] works under
the principle of the DLP. The problem by cracking the cryptography ends upon the determining r- integer,
where gr = x mod p. r the integer is tabbed as the DLP for x at the wiring g. It could be rewritten as r =
3. Int J Elec & Comp Eng ISSN: 2088-8708
Quantum cryptography for secured communication networks (B. Muruganantham)
409
logxmod p. The DLP is the nonflexible problem to find out, when large number of parameters are found.
The key exchange mechanism of the Diffie Hellman are the asymmetrical cryptography. In the public
channels, the keys are shared securely. The larger key size or the bits equal to 2048 bits applied for the safer
exchange of keys. The Elliptic Curve Cryptography is also the member of public key family. The ECC
provides the similar security with the RSA and the DLP [4]. The pair (x: y) is used by the ECC for the
equation z2 = y3 + bx +a mod p with theWhere b;a∈Zp and 4a3+ 27b3 + 6 = 0modp. The needs of the ECC
group G of cyclic and the elements of the primitives. The Elliptic Curve Cryptography is efficient
unsymmetrical and the secured system.
5. ELLIPTIC CURVE CRYPTOGRAPHY
The newly designed cryptography algorithm depends upon the dots that are on the line round
a circle of not based on rules distance to the center of the arithmetic over first in rating numbers. The ECC
science of keeping knowledge safe and secret makes request to come between the setup and the operation and
the organizations with new algorithm presented. In the ECC it has only the one zero point and the integers
points which are not a member of the group could be used. It is a straight forward encryption that that of
making orders for computer than elliptic curve science of keeping knowledge safe and secret [12]. This ECC
algorithm have the chief cons side made a comparison of ECC those are low in safe of equal primes that
gives knowledge before event. When compared to RSA it has same security. The ECC acts stage modulation
that perform the round on ellipse of many operations, that published in the literature of physics are in
confused state of the Phase modulation. With the way of analogous of Diffie Hellman, exchanging of keys
were possible. The newly introduced algorithm applied for the electronic sign-marks, distribution of the keys,
authentications [13].
Let us assume that Kanish and Ganesh wanted to share messages. Initially Kanish selects the p of
prime number. Then, the integer of radii b and a, with the maximum order n Kanish selects her base pair.
As already said Kanish starts her message with the Diffie Hellman key exchange mechanism to have
the same key between them. The messages then broken into the blocks with pairs by Kanish and then
encrypts the blocks with the same keys, up to all the messages are encoded. Later Kanish sends the encoded
message to Ganesh. With the commonly shared key Ganesh decrypts the messages. The pairs with the blocks
are decrypted to view it as the original messages.
6. QUANTUM CRYPTOGRAPHY
The bit strings made in a way within the exchange among the users that they are not directly
interacting. Still, the users having a strong belief that the messages (bit strings) shared within them are safe
and secured. The two users given access, that usually both the users, to make certain secured keys order by
the movement to opposite positions principle [14]. The photons that passed are in these ways: Vertical,
Horizontal and the diagonals as shown in Table 1. The initial states represented with the orientation called
the Rectilinear and the next represented as the orientation called the Diagonal orientation. The orientations
are represented as+, /, .
Table 1. States for the polarization of the poton
Basis 0 1
+
×
7. QUANTUM KEY DISTRIBUTION
The acts that offers the safely exchanging the secret key between the users over an unsafe narrow
way [15]. The quantum key cryptography lies on the quantum physics are based on the quantum laws that are
harmful for increasing the power consumptions by the polarization of the quantum, the fiber optic channels
used for transmitting messages. In the year 1984, the Quantum Key Distribution initially introduced, where
Gills Brassard and Charles Bennett founded a protocol of BB84. After the development of this protocol,
many of the protocols consequently invented [16]. It is very hard for the attackers to do eavesdrop in the fiber
optic channel. When the message are corrupted or attacked by the eavesdropper, it can be found that
the amount of messages being corrupted. This is used in BB84 [17, 18]. The entangled objects with the pairs
used in which the objects shared between the users, the protocol called the Entanglement Based (EB).
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 407 - 414
410
One of the objects is considered from two or more objects, which are the entanglement quantum phenomenon
in the quantum cryptography. During the process of entanglement, if one of the systems intercepts the
entangled pair of the objects, the entire system is altered. It is showing that the attacker is present and how
much amount of data the attacker has taken [19]. The E91 protocol is exposing this protocol. Again they are
divided into three; Continuous Variable Coding, Distributed Phase Reference Coding, Discrete Variable
Coding. Figure1 shows the QKD between Kanish (sender) and Ganesh (receiver).
Figure 1. QKD between kanish (sender) and ganesh (receiver)
The limitations of the experiments are the overcoming of the concerned protocols as follows.
7.1. Mathematical based solution
The many public key cryptography that are used as mathematical functions such as the RSA, Diffie
Hellman, Elliptic Curve Cryptography, where the masked sub-group are does not applied. An outcome of
that, they come into view as quantum that is strongly against those problems. The following are
the mathematical based and the implementation that mostly researched.
a. Lattice based cryptography [4]
The feebleness of RSA algorithm kept out by this sort of public key science of keeping
the knowledge safe and secret. Mostly, increasing in number first in rating, lattice based encryptions design
should do with increasing in number of lines. In addition, lattice based cryptography making that based on as
true problem of the Shortest Vector Problem (SVP). The given data here indicated are with the basis of the
arbitrary lattice. The Shortest Non Zero vector is the aim of the lattice based cryptography.
b. Multivariate based cryptography [20]
The algorithm is developed with the encryption are so difficult in the multivariate based
cryptography. The both digital signatures and the encryption are used in the multivariate cryptosystem. With
the multivariate based polynomials many of the asymmetric public keys tried. The new way of the efficient
scheme is the Simple Matrix, which overcomes the weakness by the application of the matrix multiplication.
Moreover, this cryptosystem are used for the Digital Signature. The signature ways that used are the rainbow,
oil and vinegar signature schemes. The ratios that are between the number of the equations and the variables
are contained in the UOV. That makes the hash values that are three times weaker than the signatures. With
the Rainbow, it has smaller ratio that gives the output as the minimum key sizes and the Digital Signatures.
c. Hash based signature [2]
In the year 1979, Leslie Lamport invented the scheme called the Lamport signature scheme.
The parameter b, defines the level of security with the system. The bits of 128 bits, the secured hash function
are needed in the security level. The length of the arbitrary and that gives the output as 256 bits. The Optimal
Solutions that are fitted with the messages are the SHA 256.
d. Code based cryptography [21]
The code based cryptography makes use of correcting the codes that are error. The linear codes are
very difficult in decoding with the algorithm and the attacks in the quantum when the sizes of the keys that
are increased by the factors. Buchmann et al [21] stated, with the way that problem of decoding are to
transform it in the low weight code world problem (LWCWP), it is impossible with the LWCWP in the large
dimension. More comfortable to see clearly the process of this design by Buchmanns saying in small number
of words account of McElieces first form by the code based key using the public encryption systems.
5. Int J Elec & Comp Eng ISSN: 2088-8708
Quantum cryptography for secured communication networks (B. Muruganantham)
411
7.2. BB84 protocol
The first protocol that is in use today in the quantum cryptography is the BB84 protocol. In harmony
with the protocol of Mayer’s BB84, explaining that the secret keys are produced when the error rates that
occurs less than 7%. The BB84 protocol used for the polarization of the photons in the quantum channel for
producing the order of the qubits that transmitted in the channels [22].
BB84 used the two polarization techniques, which are Horizontal and the Diagonal polarization.
Let us assume that Kanish and Ganesh are sharing their messages secretly by using the polarization
technique. Kanish uses polarization technique to encode messages with the polarized photons in the channel.
Now, the filters used by Kanish is known only to him and Ganesh using the fiber optic channel. Here, if there
is any eavesdropper trying to copy or alter the messages sent by them, then the users will get to know that
someone is trying to copy the share secret messages [23, 24]. This type of attack is prevented using the BB84
protocol. It is illustrated in Figure 2 with Alice and Bob example.
Figure 2. BB84 protocol
The other few quantum protocols are as follows,
a. BBM [25] – the entanglement type of BB84 protocol.
b. E91 [26] – depend upon Gedanken experiment and in the extension of Bennett and Brassard.
c. SARG04 [22, 23] - similar to BB84. SARG04 more in use that of BB84 over the Photon Number
Splitting attack (PNS).
d. Six-State Protocol [24, 27] – also a type of BB84 protocol which uses the Six State photon polarization
technique.
e. Six State is also a type of the SARG04 coding technique [28].
f. Singapore Protocol [29] –it is a tomography representation which is highly efficient then the Six State
Protocol.
g. B92 Protocol [30] - uses the two states of the quantum by the very low intensity which is coherent with
the pulses of the light.
8. QUANTUM CRYPTOGRAPHY ALGORITHMS
The effect of the quantum algorithms on the current cryptography gives basis for the Grover’s and
the Shor’s algorithm. The difficulty of doing the factorization or the computation of the Discrete Logarithm
vulnerable.
8.1. Shor’salgorithm
Peter Shor, the mathematician “Algorithms for the Quantum Computation: Discrete Logarithm and
Factorization, quantum computer that totally changes the fundamentals of the very large integers are proved
by the factorization. The asymmetric cryptography are collapsed by the Shor’s algorithm. Because, it is
factorizes the very large prime numbers. The following example shows the factorization process [31]. Let us
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 407 - 414
412
assume, the number 15. It is need to the 4 qubit register for this number. The regular 4 bit register is needed
for the computation of the computers. The binary representation of the number 15 is 1111. The computation
of the calculations that are performed on the registers are done in parallel by Castro and Bone. The major step
that is done in Quantum Cryptography to be performed.
A second 4-qubit register is used to store the remainder from this operation. The superposition
results are now in the second register. Let us take, X=2, is smaller than the number 14 but larger that
the number 1.
The x is raised to the power of the 4qubit, that are the numbers maximum of 15 and are divided by
15 and the remainders are stored in the registers as shown in the Table 2. In the observation, the results are
the number 4 in the sequence. Confidently saying that sequence number f=4, when the X = 2 and the number,
n = 15. To calculate the possible factor of the f, the possible factor: P = Xf/2-1.
Table 2. 4-Qubit registers with remainders
Register 0 1 2 3 4 5 6 7 8 9 1 1 1 1 1 1
1 0 1 2 3 4 5
Register 1 2 4 8 1 2 4 8 1 2 4 8 1 2 4 8
2
The following are done in the algorithm are as follows,
a. Let n=15, number to be factorized.
b. X = number in random, choosen from 1<x<n-1.
c. X the power which is raised. That are stored in the registers. And then divided by the prime number n.
The results sometimes obtained which are not the prime numbers. So, repeat the f values with
the different calculations. The Discrete Logarithm Problems are computed by the Shor’s algorithm. It is
showed that the performance of the calculation are done from the starting random superposition of the integer
of two states, and also performs the Quantum Fourier Transform. The given equations are satisfied by
the new superposition states to give the high probability of the two integers. The unknown “exponent” of
the Discrete Logarithm Problem calculated using this equation to find the value r.
8.2. Grover’s algorithm
The Grover’s algorithm that created by the mathematician, Lov Grover’s used mainly by
the Quantum Computer for searching the unsorted databases [32]. The unsorted database of the N entries and
in N searches with the Shor’s algorithm could able to find p. The same entry could be searched with
the conventional computers would need N = 2 searches. The Data Encryption Standard is cracked by using
the Grover’s algorithm that are stated by Castro and Bone. For this security, the key bit used is 56 bit key.
It is stated that it needs the 185 searches for finding the bits of the keys. The number of the key bits are
increased to prevent the password cracking by the attackers. It resulted that, the increase in the exponential
are high for the number of the searches to cracking a password. The Grover’s algorithm is less fast than
the Shor’s algorithm.
9. CONCLUSION
Compared with classical cryptography, Quantum cryptography has ultimate advantages that are
unconditional sniffing detection and the security. These characteristics can solve security problem for
the future Internet. In particular, it provides security for various applications like Internet of things (sending
messages, data access, saving the files with cryptography) Security and Communication Networks for
the future Internet. Quantum cryptography results show the unconditional security and sniffing
(eavesdropping) detection of quantum cryptography, which makes it suitable for future Internet.
REFERENCES
[1] C. H. Bennett and G. Brassard, “QuantumCryptography: public key distribution and coin tossing,”IEEE Conference
on Computer, Systems, and Signal Processing, pp.175-90, 1984.
[2] C. Dods, et al., “Hash Based Digital Signature Schemes,” Cryptography and Coding, vol. 3796, pp. 96-115, 2005.
[3] W. Diffie and M. E. Hellman, “New Directionsin Cryptography,” IEEE Transactions in Information.
[4] D. Micciancio, “Lattice-Based Cryptography,” Post-Quantum Cryptography, vol. 015848, pp. 147-192, 2009.
[5] S.V. Manikanthan and T.Padmapriya, “A Secured Multi-Level Key Management Technique for Intensified
Wireless Sensor Network,”International Journal of Recent Technology and Engineering, vol. 7, 2019.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Quantum cryptography for secured communication networks (B. Muruganantham)
413
[6] D. Bruss, et al., “Quantum cryptography: A survey,” ACMComputing Surveys, vol. 39, pp. 1-27, 2007.
[7] C. H. Bennett, et al., “Experimental quantum cryptography,”Journal ofCryptology, vol. 5, pp. 3-28, 1992.
[8] G. J. Simmon, “Symmetric and asymmetric encryption,” ACM Computing Surveys, vol. 11, pp. 305-330, 1979.
[9] D. Bruss, et al., “Quantum cryptography: A survey,” ACMComputing Surveys, vol. 39, pp. 1-27, 2007.
[10] A.Sen, et al., “Bit levelsymmetric key cryptography using Genetic Algorithm,”CSNT, pp. 37, 2017.
[11] N. Papanikolaou, “Anintroductiontoquantumcryptography,” ACM Crossroads Magazine, vol.11, pp. 1-16, 2005.
[12] E.F.Dettrey and E.A.Yfantis, “A New Elliptic CurveCryptographicAlgorithm,”ComputingandCommunication
Workshop and Conference (CCWC), IEEE. 2018.
[13] R.Balamurugan, et al., “Enhancing security in text message using matrix based mapping and Elgamal method in
Elliptic Curve Cryptography,” International Conferenceon Contemporary Computing and Informatics (IC31),
IEEE, 2014.
[14] L. I.Jian, et al., “A Survey on Quantum Cryptography,” vol. 27, 2018.
[15] A. Singh, “Centralized Key Distribution on Quantum Cryptography,”International Journal ofComputer Science
and Mobile Computing (IJCSMC), vol.6, 2017.
[16] O.Cangea, et al., “Implementing Quantum Cryptography for Data Security,”International Conference
onElectronics, Computers and Artificial Intelligence (ECAI), 2017.
[17] Y. Wang andKunShe, “A Practical Quantum Public Key Encryption Model,”International Conference on
InformationManagement, 2017.
[18] T. Zhou, et al., “Quantum Cryptography for the Future Internet and the Security Analysis,” 2018.
[19] R. Goel, et al., “Research Directions on Quantum Crptography,” InternationalConferenceonInformationTechnology
(ITNG’07), 2007.
[20] J. Ding and B.Y. Yang, “Multivariate Public Key Cryptography,” Post- Quantum Cryptography, pp. 193-241,
2009.
[21] R. Overbeck and N. Sendrier, “Code-based Cryptography,” Post- Quantum Cryptography, Berlin, Heidelberg:
Springer Berlin Heidelberg, pp. 95-145, 2009.
[22] V. Scarani, et al., “Quantum cryptography protocols robust against photon number splitting attacks for weak laser
pulse implementations,” Physical review letters, vol. 92, pp.057901, 2004.
[23] A. Acin, et al., “Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-
splitting attacks,” Physical Review A, vol. 69, pp. 012309, 2004.
[24] C. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Proceedings of
IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179, 1984.
[25] C. H. Bennett, et al., “Quantum cryptography without bell’stheorem,”Physical Review Letters, vol. 68,
pp. 557, 1992.
[26] A. K. Ekert, “Quantum cryptography based on bell’s theorem,” Physical review letters, vol. 67, pp. 661, 1991.
[27] H. B. Pasquinucci and N. Gisin, “Incoherent and coherent eavesdropping in the six-state protocol of quantum
cryptography,” Physical Review A, vol. 59, pp. 4238, 1999.
[28] K. Tamaki and H.K. Lo, “Unconditionally secure key distillation from multiphotons,” Physical Review A, vol. 73,
pp. 010302, 2006.
[29] B.G. Englert, et al., “Efficient and robust quantum key distribution with minimal state tomography,”
arXiv: quant-ph/0412075, 2004.
[30] C. H. Benne, et al., “Quantum cryptography using any two nonorthogonal states,” Physical review letters, vol. 68,
pp. 3121, 1992.
[31] M. S.Sharbaf, “Quantum Cryptography: A New Generation of Information Technology Security
System,”International Conference on Information Technology, 2009.
[32] V.Mavroeidis, et al., “The impact of Quantum Cryptography on present cryptography,” InternationalJournal of
Advanced Computer Science and Applications, vol.9, 2018.
BIOGRAPHIES OF AUTHORS
Dr. B.Muruganantham Associate Professor
Faculty of Engineering and Technology
Computer science and Engineering
SRM Institute of Science and Technology Kanchipuram
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 407 - 414
414
Dr .S. Ganesh Kumar
Associate Professor
Faculty of Engineering and Technology
Computer Science and Engineering
SRM Institute of Science and Technology
Kanchipuram
A. Murugan
Associate Professor
Faculty of Engineering and Technology
Computer science and Engineering
SRM Institute of Science and Technology
Kanchipuram