Network Security Based on Quantum Cryptography

Authors

  • Dr. Sandip Dutta

  • Anand Kumar

  • N.C.Mahanti

Keywords:

Network security, Quantum cryptography, photon polarization, deterministic one step quantum key distribution, polarization filter, Hadamard matrices,

Abstract

An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain existing algorithms and makes the transmission of data through an insecure channel less vulnerable to various attacks. The algorithm uses the concept of bases: rectilinear and diagonal for the sender and the receiver respectively [1]. This is a deterministic algorithm in which the two communicating parties use the same orthogonal bases to measure each qubit in the transmitted message. The algorithm uses the concept described by Lester-Hill [2] in the intermediate steps of the cryptographic process. The key that is transmitted over the network is made less vulnerable to the man-in-the-middle attack using the Diffie-Hellman concept of key exchange [3].

How to Cite

Dr. Sandip Dutta, Anand Kumar, & N.C.Mahanti. (2011). Network Security Based on Quantum Cryptography . Global Journal of Computer Science and Technology, 11(12), 9–12. Retrieved from https://computerresearch.org/index.php/computer/article/view/796

Network Security Based on Quantum Cryptography

Published

2011-05-15