International Conference on Advances in Computer Engineering and Applications |
Foundation of Computer Science USA |
ICACEA - Number 5 |
March 2014 |
Authors: S. Nagaprasad, G. Srinivasa Rao, B. Sujatha |
0954d529-7e6e-4fca-aa55-b01822d5af15 |
S. Nagaprasad, G. Srinivasa Rao, B. Sujatha . The View of a Better Implementation of Practical - Quantum Cryptographic Architecture. International Conference on Advances in Computer Engineering and Applications. ICACEA, 5 (March 2014), 32-35.
Quantum Key Distribution (Q. K. D. ) provides us a protected communication channel. In present days we have some latest problems existing in Quantum key distribution. Let us look in to the Quantum key distribution Research analysis which provides us the Information about BB84 Protocol, using reducing laser light is used as a Photon Source, Protected keys could not be generated. The reason is it's weakness towards a Photon Number Splitting (PNS) attack which we call it as Sequential Unambiguous State Discrimination (USD) attack. We need to generate the keys with more secured mechanism.