Open Access Open Access  Restricted Access Subscription or Fee Access

A Study and Design of Encryption Less Protocol using Quantum Bits for Secure Communication in Wireless Network

K. Maharajan, M. JayaLakshmi, Dr.B. Paramasivan, V. SivaKumar

Abstract


Today‟s wireless network has become one of the most important communication medium. However, providing secure communication for wireless network has become the challenging issues at present days. In present communication system, traditional cryptography was used for secure communication. It has more computational complexity and intruder may easily retrieve the encrypted messages. To overcome this complexity we aim to design a new protocol using quantum bits for enhancing the security. Quantum mechanics defines structure and behavior of quantum bits (i.e.) often called Qubits and it is thousand times faster than traditional one. A traditional computer system uses two bits 0 (or) 1. In quantum system uses Qubits that is normally represented mathematically by vectors such as |0>, |1> as two states, and four bases |H>, |V>, |R>, |L>. By this quantum cryptography method two parties may generate secret cryptographic key known as checkbits which are generated using static quantum channel. Two channels namely public and hidden channels are used to transfer data through secured mode without encryption. By using hidden channel concept in quantum mechanics, secure transmission of data without encryption can be done.

Keywords


Quantum Mechanics, Quantum Bits, Check Bits, Public Channel, Hidden Channel,

Full Text:

PDF

References


Mohamed Elboukhari, Mostafa Azizi and Abdelmalek zizi “ Improving TLS Security By Quantum Cryptography” Vol.2, No.3, July 2010 International Journal of Network Security & Its Applications (IJNSA)

Gisin, N., et al.: „Quantum cryptography‟, Rev. Mod. Phys., 2002, 74, pp. 145–195.

C.-Z. Peng et al., “Experimental free-space distribution of entangled photon pairs over 13 km: Towards satellite-based global quantum communication,” Phys. Rev. Lett., vol. 94, no. 15, pp.150501-1– 150501-4, Apr. 2005.

D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, “Entangled state quantum cryptography: Eavesdropping on the Ekert protocol,” Phys. Rev. Lett., vol. 84, no. 20,pp. 4733–4736, May 2000.

Tim Dierks , Eric Rescorla, “ The Transport Layer Security (TLS) Protocol, Version 1.2” , RFC 5246 , August 2008.

Alan Mink, Sheila Frankel and Ray Perlner, “Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration”J. International Journal of Network Security & Its Applications (IJNSA), vol Volume 1. Number 2, July 2009.

M. Elboukhari, M. Azizi, A. Azizi “Integration of Quantum Key Distribution in the TLS Protocol”, IJCSNS, Vol. 9 No. 12 pp. 21-28, 2009. Elliott, C., “The DARPA Quantum Network”, Quantum Communications and Cryptography, 2006.

Poppe, A., M. Peev, and O. Maurhart, Outline of the SECOQC quantum-keydistribution network in Vienna. International Journal of Quantum Information, 2008. 6(2): p. 209-218.

C.E Bennet and G.Brassard. “quantum cryptography: public key Distribution and coin tossing” in proc.of the IEEE Int. Conf. On Computers.Systems & Signal Processing. Pp.175-179, Banglore, India.

C.H. Bennett, “Quantum Cryptography using any two Nonorthogonal states, “phys.Rev. Lett,68,3121-3124.

Gobby C.Z.L. Yuan and A.j Shields, “Quantum Key distribution over 122km of standard telecom Fiber”, Applied Physics Letters, Vol.84.3762-3764.

J.Mehra and H.Rechenberg, “The Historical Development of Quantum Theory”, vol.1, Part 1, Springer-Verlag New york Inc., New york.

J.G.Parity, P.R. Tapster and P.M.Gorman, “Secure Free-Space Key-exchange to 1.9km and Beyond”, Journal of Modern optics, vol.48, 1887-1901.

A.Bergou, R.Gingrich, and C. Adami, “Entangled Light in Moving Frames,” Physical Rev.A. vol. 68.no.042102.

C.E.Shannon,” A Mathematical Theory of Communication, “Bell Systems Technical J., vol.27, July-oct.(1998), pp.379-423 and 623-656.

Nguyen, T.M.T., M.A. Sfaxi, and S. Ghernaouti-Hélie, 802.11 i Encryption Key Distribution Using Quantum Cryptography. JOURNAL OF NETWORKS, 2006. 1(5): p. 9.

M. Elboukhari, M. Azizi, A. Azizi, “Implementation of secure key distribution based on quantum cryptography”, in Proc. IEEE Int. Conf Multimedia Computing and Systems (ICMCS‟09), pages 361 - 365, 2009.

URL:http://www.cs.ucla.edu/jkong/research/security/shannon.html

C. H. Bennet and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing” in Proc. of the IEEE Int. Conf. on Computers, Systems & Signal Processing, pp. 175-179, Bangalore, India, December 10-12, (1984).


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.