Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/287073
Title: | Quantum Cryptography Based Security Stratagem for Key Exchange in Next Generation Communication Devices |
Researcher: | Sarath R |
Guide(s): | Shajin Nargunam A |
Keywords: | Engineering and Technology,Engineering,Instruments and Instrumentation |
University: | Noorul Islam Centre for Higher Education |
Completed Date: | 30/04/2018 |
Abstract: | ABSTRACT newlineCommunication with effective security has been the ultimate need of the users. In cryptography, key is exchanged by physical means. Key send by physical means has many practical security problems which lead to the major setback in cryptography. Quantum cryptography provides a solution for the above issue. In Quantum cryptography keys are transmitted in the form of photon using Quantum channel. The advantage of Quantum cryptography is that it has not only two states but also a superposition of both known as qubit. The most successful topic in Quantum cryptography is Quantum key distribution. BB84 protocol is the most widely used protocol for Quantum key distribution. This protocol assures a secure communication using Quantum mechanics. This protocol uses Quantum channel for transmitting the photons and the public channel for cross examining the transmitted photons. Quantum mechanics has the property of identifying the presence of intruder. Quantum cryptography is theoretically strong but has practical difficulties. The drawbacks of the BB84 protocol are eliminated by combining the techniques of Quantum cryptography and classical cryptography. newlineThe combination of Quantum technique and classical technique is used to ensure secure communication in the proposed method. With the help of dual channel the bit error rate is decreased and the security is increased. The potential interference by eavesdroppers, leads to errors in a transmitted key which must be resolved prior to applying any cryptographic cipher. Efficiently reconciling these errors is the focus of this research. The overall contribution of this research is to transfer the data for generating key in a highly-secured manner by the combination of Quantum technique and classical technique. The point-to-point behaviour of QKD gives rise to the possibility of a denial-of-service attack. Due to the denial of service attack, the amount of photon obtained by the receiver will not be sufficient enough for key making. This leads to the major failure of QKD. In |
Pagination: | 133 |
URI: | http://hdl.handle.net/10603/287073 |
Appears in Departments: | Department of Electronics and Instrumentation Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
acknowledgement.pdf | Attached File | 6.29 kB | Adobe PDF | View/Open |
certificate.pdf | 18.72 kB | Adobe PDF | View/Open | |
chapter iii.pdf | 480.55 kB | Adobe PDF | View/Open | |
chapter ii.pdf | 247.27 kB | Adobe PDF | View/Open | |
chapter i.pdf | 274.77 kB | Adobe PDF | View/Open | |
chapter iv.pdf | 338.84 kB | Adobe PDF | View/Open | |
chapter vii.pdf | 52.09 kB | Adobe PDF | View/Open | |
chapter vi.pdf | 368.73 kB | Adobe PDF | View/Open | |
chapter v.pdf | 329.82 kB | Adobe PDF | View/Open | |
references.pdf | 108.11 kB | Adobe PDF | View/Open | |
title page.pdf | 18.06 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: