CFP last date
22 April 2024
Reseach Article

Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography

by Darnasi Veeraiah, R. Upendar Rao, K V Ranga Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 3
Year of Publication: 2013
Authors: Darnasi Veeraiah, R. Upendar Rao, K V Ranga Rao
10.5120/13724-1520

Darnasi Veeraiah, R. Upendar Rao, K V Ranga Rao . Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography. International Journal of Computer Applications. 79, 3 ( October 2013), 43-47. DOI=10.5120/13724-1520

@article{ 10.5120/13724-1520,
author = { Darnasi Veeraiah, R. Upendar Rao, K V Ranga Rao },
title = { Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 3 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number3/13724-1520/ },
doi = { 10.5120/13724-1520 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:05.925277+05:30
%A Darnasi Veeraiah
%A R. Upendar Rao
%A K V Ranga Rao
%T Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 3
%P 43-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In now a days, most of the communication takes place through Internet. Most of the users are used to transmit their information through insecure channels that are interconnected throughout world. Thus, security must be provided to achieve confidentiality, access control, integrity and authentication. To ensure all these services, various cryptography and steganography techniques like RSA, AES, MD5 and RC5 have been used. Even though, cryptanalysts reinforcing it using some mathematical computation and misused information. Currently, quantum computers have been used to increase the speed of computation and to provide more security for data. It exploits quantum mechanics to provide secure communication. Quantum cryptography (QC) technique has been used to share the key among the participants who wish to share the data. This paper discusses various cryptographic key distribution protocols and quantum mechanics. In this paper we proposed "Secure Node Signature Verification Algorithm"(SNSVA) based on Quantum cryptography technique that describes how authentication can be verified with network nodes. In addition, it explains an approach to improve the performance of cryptography technique.

References
  1. Bennett and Brassard, G. ,"Quantum cryptography: public key distribution and coin tossing", IEEE Conference on Computer, Systems, and Signal Processing, 1984, pp. 175-90.
  2. Bennett, C. H. , "Quantum cryptography using any two non-orthogonal states". Physics Review Letter1992.
  3. Bennett, C. H. , Bessette, F. , Brassard, G. , Salvail, L. , & Smolin, J. ,"Experimental quantum cryptography", Journal of Cryptology, 1992.
  4. Elliot, C. , "Quantum Cryptography", IEEE Security & Privacy Journal, 2004.
  5. B. Hutter, N. Imoto, N. Gisin, T. Mor, Quantum cryptography with coherent states, Physical Review pp. 1863–1869, 1995.
  6. Inoue K, Woks E and Yamamoto Y 2002, "Differential phase shift quantum key distribution", Phys. Rev. Lett. 89 037902.
  7. Chi-Hang Fred Fung, Kiyoshi Tamaki, Hoi-Kwong Lo, "On the performance of two protocols: SARG04 and BB84", Phys. Rev. A 73, 012337 (2006).
  8. Eduin H. Serna,"Quantum Key Distribution Protocol withPrivate-Public Key", Quantum Physics, 2009.
  9. Higgins, Diffie, Strawczynski and Hoog, "Encryption and ISDN - A Natural Fit", International Switching Symposium (ISS87), 1987.
  10. Bellovin and Merritt, "Encrypted Key Exchange: Password Based Protocols Secure against Dictionary Attacks and Password file Compromise", Proceedings of 1st ACM Conference on Computer and Communication Security, ACM Press, pp. 244-250, 1993.
  11. Wegman and Carter,"New Hash Functions and Their Use in Authentication and Set Equality', J. Comput. Syst. Sci. , Vol. 22, pp. 265-279, 1981.
  12. http://www. quantiki. org
  13. http://cam. qubit. org
  14. http://www. afn. org
Index Terms

Computer Science
Information Sciences

Keywords

Quantum Cryptography Security Authentication Entanglement BB84 protocol