Network Security Based on Quantum Cryptography
Keywords:
Network security, Quantum cryptography, photon polarization, deterministic one step quantum key distribution, polarization filter, Hadamard matrices,
Abstract
An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain existing algorithms and makes the transmission of data through an insecure channel less vulnerable to various attacks. The algorithm uses the concept of bases: rectilinear and diagonal for the sender and the receiver respectively [1]. This is a deterministic algorithm in which the two communicating parties use the same orthogonal bases to measure each qubit in the transmitted message. The algorithm uses the concept described by Lester-Hill [2] in the intermediate steps of the cryptographic process. The key that is transmitted over the network is made less vulnerable to the man-in-the-middle attack using the Diffie-Hellman concept of key exchange [3].
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2011-05-15
Issue
Section
License
Copyright (c) 2011 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.