CFP last date
20 January 2025
Reseach Article

Entropy Security in Quantum Cryptography

by Hitesh Singh, D. L. Gupta, A. K Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 5
Year of Publication: 2013
Authors: Hitesh Singh, D. L. Gupta, A. K Singh
10.5120/14008-2057

Hitesh Singh, D. L. Gupta, A. K Singh . Entropy Security in Quantum Cryptography. International Journal of Computer Applications. 81, 5 ( November 2013), 19-24. DOI=10.5120/14008-2057

@article{ 10.5120/14008-2057,
author = { Hitesh Singh, D. L. Gupta, A. K Singh },
title = { Entropy Security in Quantum Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 5 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number5/14008-2057/ },
doi = { 10.5120/14008-2057 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:55:16.735949+05:30
%A Hitesh Singh
%A D. L. Gupta
%A A. K Singh
%T Entropy Security in Quantum Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 5
%P 19-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum mechanics is the basic principle which is applied in the cryptographic scenario of quantum cryptography. Present paper provides a conceptual framework on the high level security protocol in Quantum cryptography. This is used as a base for data security through quantum computing in modern cryptosystem. In this paper first of all a detailed description of BB84 protocol with noise and without noise is explained, then a detailed description of mathematical analysis done by [1] on entropy security is also shown. Finally the result of the experimental work done on Matlab is shown. Our work reveals that at only 37 % bit of the key, we get maximum entropy security in communication network. . In this approach it is also possible to manage security as well as personalize services based on Quantum cryptography in better way.

References
  1. M. Niemiec, "Design Construction and Verification of a High-level Security Protocol Allowing to Apply the Quantum Cryptography in Communication Networks", 2011, Ph. D. Thesis, AGH University Of Science and Technology, Poland.
  2. C. H. Bennett and G. Brassard, "Quantum cryptography: public key distribution and coin tossing," Proc. of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
  3. M. Niemiec, "D8. 6 specification & Evaluation of quantum cryptography for security & privacy assurance"2012, AGH University of Science and Technology, Poland.
  4. T. Godhavari and N. R. Alamelu, "Quantum based secure information transmission", European journal of scientific research, ISSN 1450-216X, Vol. 66. No2 (2011) pp243-254
  5. D. Dieks,"Communication by EPR Devices", Physics Letters A, vol. 92, No. 6, 1982 pp. 271-272.
  6. Wootters, W. K. , and W. H. Zurek, "A Single quantum cannot be cloned", Nature, 299, pp. 982-983, 1982.
  7. G. Brassard and L. Salvail "Secret key reconciliation by Public discussion", Advances in Cryptology: Eurocrypt 93 Proc. Pp. 410-23, 1993.
  8. C. Gobby, Z. L. Yuan and A. J. Shields, "Quantum key distribution over 122 km telecom fiber", Appl. Phys. Lett. 84, pp. 3762–3764, 2002.
  9. D. Gottesman, H. K. Lo, N. Lutkenhaus and J. Preskill, "Security of quantum key distribution with imperfect devices", Quantum Information Computation. 4, pp. 325–360, 2004.
  10. K. J. Gordon, V. Fernandez, G. S. Buller, I. Rech, S. D. Cova and P. D. Townsend, "Quantum key distribution system clocked at 2 GHz," Optics Express 13, pp. 3015–3020, 2005.
  11. C. H. Bennett: "Quantum cryptography using any two non orthogonal states", Physical Review Letters, Vol. 68, No. 21, 25, pp. 3121-3124, 1992.
  12. Jacobs, B. C and J. D Franson, "Quantum cryptography in free space", Optics Letters, Vol. 21, pp. 1854-1856, 1996.
  13. R. J. Hughes, G. G. Luther, G. L. Morgan, C. G. Peterson and C. Simmons "Quantum Cryptography over underground optical fibres", Advances in Cryptology: Proceeding of CRYPTO'96.
  14. C. Kollmitzer, M. Pivk, "Applied Quantum Cryptography", Lect. Notes Phys. 797, Published in Springer, Berlin Heidelberg 2010.
  15. R. Pike and B. Labs, "An Introduction to Quantum Computation and Quantum Communication", Published by Lucent Technologies.
  16. MathWorkswebside. http://www. mathworks. com
Index Terms

Computer Science
Information Sciences

Keywords

Quantum cryptography entropic security information theory quantum key distribution Qubits BB84 protocol.