Secured Routing Using Quantum Cryptography

被引:0
|
作者
Anand, M. Vijay [1 ]
Jayakumar, C. [2 ]
机构
[1] Aksheyaa Coll Engn, Madras, Tamil Nadu, India
[2] RMK Engn Coll, Gummidipoondi, Tamil Nadu, India
关键词
quantum cryptography; classical cryptography; RSA; session key; Bayesian Filtering; noise; error rate; eavesdropping;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This protocol is used to maintain security in networks for secure communication by overcoming some of the drawbacks in existing security protocols. Integration of both classical and quantum cryptography techniques takes place. Quantum cryptography is used for secure optical transmission which employs quantum mechanisms to distribute session keys Classical cryptography provides convenient techniques that enable efficient key verification and user authentication. This protocol used both implicit user authentication and explicit mutual authentication. A Trust centre is used to generate a secret key and public key by using RSA algorithm and it will develop the random key for each session of transmitting data these key develop a QUIBIT values which develop Session key. By using these keys user translate the messages between the other users securely. Error rate gets reduced when compared to the existing quantum cryptography protocol. Bayesian filtering method is integrated to reduce the external noise. The merits of this new protocol are. Secures against attacks as man-in-the-middle, eavesdropping and replay. Online guessing attacks can be avoided. Efficiency is more since the proposed protocol contain the fewest number of communication rounds. Two parties can share and use a long-term secret key by a trusted center. Error due to noise gets reduced.
引用
收藏
页码:714 / +
页数:2
相关论文
共 50 条
  • [21] Stochastic Routing in Quantum Cryptography Communication Network Based on Cognitive Resources
    Li, Min
    Quan, Dongxiao
    Zhu, Changhua
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,
  • [22] Quantum cryptography using coherent state
    Zhang, XY
    Guo, GC
    [J]. CHINESE PHYSICS LETTERS, 1996, 13 (04) : 277 - 280
  • [23] Quantum cryptography using nonlocal measurements
    Cohen, O
    [J]. HELVETICA PHYSICA ACTA, 1997, 70 (05): : 710 - 726
  • [24] Modified Quantum Cryptography Using Barcodes
    Mahapatra, R. P.
    Mahajan, Roopam
    Nahil, Rajendra
    [J]. COMPUTING, COMMUNICATION, AND CONTROL, 2011, 1 : 62 - 67
  • [25] Elliptic Curve Cryptography for Secured Text Encryption
    Keerthi, K.
    Surendiran, B.
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [26] Securing Networks using Quantum Cryptography
    Chaudhuri, Kostav
    Singh, Tanya
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [27] Secure communications using quantum cryptography
    Hughes, RJ
    Buttler, WT
    Kwiat, PG
    Luther, GG
    Morgan, GL
    Nordholt, JE
    Peterson, CG
    Simmons, CM
    [J]. PHOTONIC QUANTUM COMPUTING, 1997, 3076 : 2 - 11
  • [28] Quantum cryptography using larger alphabets
    Bechmann-Pasquinucci, H
    Tittel, W
    [J]. PHYSICAL REVIEW A, 2000, 61 (06) : 6
  • [29] Implementation of a cryptography algorithm for secured image transmission
    Samoud, A.
    Cherif, A.
    [J]. INNOVATIVE AND INTELLIGENT TECHNOLOGY-BASED SERVICES FOR SMART ENVIRONMENTS-SMART SENSING AND ARTIFICIAL INTELLIGENCE, 2021, : 229 - 234
  • [30] Quantum cryptography: Secure communications using quantum physics
    Townsend, P
    Phoenix, S
    [J]. BRITISH TELECOMMUNICATIONS ENGINEERING, 1997, 16 : 207 - 213