Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

A Novel Hybrid Technique for Secret Key Sharing in Networks

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 3
Year of Publication: 2014
Authors:
R. Sarath
A. Shajin Nargunam
10.5120/15553-4223

R Sarath and Shajin A Nargunam. Article: A Novel Hybrid Technique for Secret Key Sharing in Networks. International Journal of Computer Applications 90(3):13-16, March 2014. Full text available. BibTeX

@article{key:article,
	author = {R. Sarath and A. Shajin Nargunam},
	title = {Article: A Novel Hybrid Technique for Secret Key Sharing in Networks},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {3},
	pages = {13-16},
	month = {March},
	note = {Full text available}
}

Abstract

A new approach for secret sharing of key in networks is proposed in this paper. Secret key sharing is an important problem in cryptography. This paper explains how secret key can be safely transmitted by combining Classical cryptography and Quantum techniques. The usage of dual channel technique and programmable polarizer are analyzed which ensure the way to remove the practical difficulties of quantum cryptography. This hybrid combination result in feasibility of authentication and hacker identification there by introducing a novel method for secret key transmission.

References

  • Bennet C. H. Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing II Proc. of IEEE Int. Conf. on Comput. Sys. and Sign. Proces. ,Bangalore,India, ecember 1984, pp. 175-179
  • Bennet C. H. Bessette F. Brassard G. et. aI. Experimental Quantum Cryptography J. Cryptology II 1992, V. 5.
  • Mohsen Sharifi1 and HooshanAzizi,"A Simulative Comparison of BB84 Protocol with its Improved Version",JCS&T Vol. 7 No. 3,PP. 204-208.
  • Wooters W. K. , Zurek W. H. A single quantum cannot becloned II Nature. 1982, V.
  • 299Shannon C. E. Communication Theory of Secret SystemsII Bell Syst. Tech. Jour. , 1949, V. 28, PP. 658-715.
  • Zhizhong Yan; Meyer-Scott, E. ; Bourgoin, J. ; Higgins, B. L. ; Gigov, N. ; Macdonald, A. ; Hubel, H. ; Jennewein, T. , "Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution Over Free Space and Satellite Links," Lightwave Technology, Journal of , vol. 31, no. 9, pp. 1399,1408, May1, 2013
  • Imtiaz Ahmad, A. Shoba Das; Hardware implementation analysis of SHA-256and SHA-512 algorithms on FPGAs. Computers and Electrical Engineering 31 (2005) 345–360.
  • US NIST, Secure Hash Standard, Draft FIPS PUB 180-2,May 2001.
  • Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy and William P. Marnane, Optimisation of the SHA-2 Family of Hash Functions on FPGAs Department of Electrical& Electronic Engineering, University College Cork, Ireland.
  • Stephen Barlett, "Lecture on quantum computing," NITP Summer School, Adelaide, Australia, 2003.
  • M. A. Nielsen and I. L. Chuang, "Quantum Computation And Quantum Information," Cambridge University Press, 2002.
  • W. Stallings, Cryptography and Network Security Principles and Practice, Second Edition, Prentice HallInternational, 1999. US NIST, Descriptions of SHA-256, SHA-384 and SHA-512, http://csrc. nist. gov/encryption/shs/sha256-384-5I2. pdf , 2001.
  • Implementation ofSecure Key Distribution BasedOn Quantum Cryptography
  • Quantum Cryptography For Secure Satellite Communications, Richard J. Hughes*, William T. Buttler, Paul G. Kwiat, Steve K. Lamoreaux,
  • Chaotic Quantum Cryptography Stamatios V. Kartalopoulos,The Fourth International Conference on Information Assurance and Security
  • Zhizhong Yan; Meyer-Scott, E. ; Bourgoin, J. ; Higgins, B. L. ; Gigov, N. ; Macdonald, A. ; Hubel, H. ; Jennewein, T. , "Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution Over Free Space and Satellite Links," Lightwave Technology, Journal of , vol. 31, no. 9, pp. 1399,1408, May1, 2013.