Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/287073
Title: Quantum Cryptography Based Security Stratagem for Key Exchange in Next Generation Communication Devices
Researcher: Sarath R
Guide(s): Shajin Nargunam A
Keywords: Engineering and Technology,Engineering,Instruments and Instrumentation
University: Noorul Islam Centre for Higher Education
Completed Date: 30/04/2018
Abstract: ABSTRACT newlineCommunication with effective security has been the ultimate need of the users. In cryptography, key is exchanged by physical means. Key send by physical means has many practical security problems which lead to the major setback in cryptography. Quantum cryptography provides a solution for the above issue. In Quantum cryptography keys are transmitted in the form of photon using Quantum channel. The advantage of Quantum cryptography is that it has not only two states but also a superposition of both known as qubit. The most successful topic in Quantum cryptography is Quantum key distribution. BB84 protocol is the most widely used protocol for Quantum key distribution. This protocol assures a secure communication using Quantum mechanics. This protocol uses Quantum channel for transmitting the photons and the public channel for cross examining the transmitted photons. Quantum mechanics has the property of identifying the presence of intruder. Quantum cryptography is theoretically strong but has practical difficulties. The drawbacks of the BB84 protocol are eliminated by combining the techniques of Quantum cryptography and classical cryptography. newlineThe combination of Quantum technique and classical technique is used to ensure secure communication in the proposed method. With the help of dual channel the bit error rate is decreased and the security is increased. The potential interference by eavesdroppers, leads to errors in a transmitted key which must be resolved prior to applying any cryptographic cipher. Efficiently reconciling these errors is the focus of this research. The overall contribution of this research is to transfer the data for generating key in a highly-secured manner by the combination of Quantum technique and classical technique. The point-to-point behaviour of QKD gives rise to the possibility of a denial-of-service attack. Due to the denial of service attack, the amount of photon obtained by the receiver will not be sufficient enough for key making. This leads to the major failure of QKD. In
Pagination: 133
URI: http://hdl.handle.net/10603/287073
Appears in Departments:Department of Electronics and Instrumentation Engineering

Files in This Item:
File Description SizeFormat 
acknowledgement.pdfAttached File6.29 kBAdobe PDFView/Open
certificate.pdf18.72 kBAdobe PDFView/Open
chapter iii.pdf480.55 kBAdobe PDFView/Open
chapter ii.pdf247.27 kBAdobe PDFView/Open
chapter i.pdf274.77 kBAdobe PDFView/Open
chapter iv.pdf338.84 kBAdobe PDFView/Open
chapter vii.pdf52.09 kBAdobe PDFView/Open
chapter vi.pdf368.73 kBAdobe PDFView/Open
chapter v.pdf329.82 kBAdobe PDFView/Open
references.pdf108.11 kBAdobe PDFView/Open
title page.pdf18.06 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: