scispace - formally typeset
Book ChapterDOI

Modeling and Simulation of Secure Data Transfer in High Level Language Using Quantum Communication Protocol

TLDR
This proposed communication system is capable of transferring the data in the form of character rather than the bit-by-bit data transfer, and the main problem of secure key exchange is solved.
Abstract
Secure data transfer is the main important task in the data transfer between the two or multiple nodes in the network. There are very large number of protocols and security mechanisms available. These security mechanisms can be broken by using the very high computing power processors. Quantum cryptography can be the promising secure communication using quantum physical laws. Quantum communication itself makes the communication more promising and reliable in terms of security. Many quantum cryptography protocols are proposed till date for secure communication including a popular “three-stage quantum cryptography protocol” (Kak in Phys Lett 293–296, 2006 [1]). In the current quantum cryptography protocols, the unit of data is a binary bit. Here, the proposed communication system is capable of transferring the data in the form of character rather than the bit-by-bit data transfer. This methodology uses the simple logic, i.e., the high level language is used for the data transfer. The main problem of secure key exchange is solved. The angle of rotation of the photon beam is being shared securely. Here, a secure multistage quantum communication protocol is implemented. This proposed protocol has minimized the network traffic drastically. The number of signals required for the transfer of the character is decreased six times of the previous one.

read more

References
More filters
Journal ArticleDOI

Quantum cryptography

TL;DR: A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Journal ArticleDOI

An introduction to quantum computing for non-physicists

TL;DR: Basic principles of quantum mechanics are introduced to explain where the power of quantum computers comes from and why it is difficult to harness and various approaches to exploiting the powerof quantum parallelism are explained.
Journal ArticleDOI

A Three-Stage Quantum Cryptography Protocol

TL;DR: A three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key, where the communication in the proposed protocol remains quantum in each stage.
Journal ArticleDOI

The black paper of quantum cryptography

TL;DR: In this article, the authors review the progress in practical quantum key distribution focusing on the elements of trust that are common to classical and quantum implementations of key distribution, and some threats to security that have been highlighted recently.
Related Papers (5)