International Conference on Advances in Computer Engineering and Applications |
Foundation of Computer Science USA |
ICACEA - Number 4 |
March 2014 |
Authors: G. Srinivasa Rao, B. Sujatha, S. Nagaprasad������ |
9f755c4d-d1e8-4154-a255-79374e27dcc9 |
G. Srinivasa Rao, B. Sujatha, S. Nagaprasad������ . A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview. International Conference on Advances in Computer Engineering and Applications. ICACEA, 4 (March 2014), 4-7.
Quantum Cryptography is also a Promising Approach visible of final Quantum Computers existence. it is a singular study Technique that provides us a singular secret Protocol that cannot be glorious by anybody. Quantum Cryptography holds foot on laws of Physics The quantum physics Law, however not as like that we have a tendency to area unit victimization addition, multiplication kind of arithmetic Puzzles used in PGP (Pretty smart Privacy). Quantum Cryptography will stand as a mile stone and cannot be challenged by future advancements throughout this field; if truth be told they'd be suggesting it as a certain communication protocol channel. enable us to careful derive the functions that provides a full account of the operational characteristics of a general QKD system. We wish to analyze specifically created to characterize the Bennett-Brassard Four-State (BB84) QKD protocol plenty of precisely, a group of generalizations that embrace the primary BB84 protocol as a special case, where the sender and so the receiver may take overtime in their alignment.