CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Novel Hybrid Technique for Secret Key Sharing in Networks

by R. Sarath, A. Shajin Nargunam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 3
Year of Publication: 2014
Authors: R. Sarath, A. Shajin Nargunam
10.5120/15553-4223

R. Sarath, A. Shajin Nargunam . A Novel Hybrid Technique for Secret Key Sharing in Networks. International Journal of Computer Applications. 90, 3 ( March 2014), 13-16. DOI=10.5120/15553-4223

@article{ 10.5120/15553-4223,
author = { R. Sarath, A. Shajin Nargunam },
title = { A Novel Hybrid Technique for Secret Key Sharing in Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 3 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number3/15553-4223/ },
doi = { 10.5120/15553-4223 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:06.701716+05:30
%A R. Sarath
%A A. Shajin Nargunam
%T A Novel Hybrid Technique for Secret Key Sharing in Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 3
%P 13-16
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A new approach for secret sharing of key in networks is proposed in this paper. Secret key sharing is an important problem in cryptography. This paper explains how secret key can be safely transmitted by combining Classical cryptography and Quantum techniques. The usage of dual channel technique and programmable polarizer are analyzed which ensure the way to remove the practical difficulties of quantum cryptography. This hybrid combination result in feasibility of authentication and hacker identification there by introducing a novel method for secret key transmission.

References
  1. Bennet C. H. Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing II Proc. of IEEE Int. Conf. on Comput. Sys. and Sign. Proces. ,Bangalore,India, ecember 1984, pp. 175-179
  2. Bennet C. H. Bessette F. Brassard G. et. aI. Experimental Quantum Cryptography J. Cryptology II 1992, V. 5.
  3. Mohsen Sharifi1 and HooshanAzizi,"A Simulative Comparison of BB84 Protocol with its Improved Version",JCS&T Vol. 7 No. 3,PP. 204-208.
  4. Wooters W. K. , Zurek W. H. A single quantum cannot becloned II Nature. 1982, V.
  5. 299Shannon C. E. Communication Theory of Secret SystemsII Bell Syst. Tech. Jour. , 1949, V. 28, PP. 658-715.
  6. Zhizhong Yan; Meyer-Scott, E. ; Bourgoin, J. ; Higgins, B. L. ; Gigov, N. ; Macdonald, A. ; Hubel, H. ; Jennewein, T. , "Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution Over Free Space and Satellite Links," Lightwave Technology, Journal of , vol. 31, no. 9, pp. 1399,1408, May1, 2013
  7. Imtiaz Ahmad, A. Shoba Das; Hardware implementation analysis of SHA-256and SHA-512 algorithms on FPGAs. Computers and Electrical Engineering 31 (2005) 345–360.
  8. US NIST, Secure Hash Standard, Draft FIPS PUB 180-2,May 2001.
  9. Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy and William P. Marnane, Optimisation of the SHA-2 Family of Hash Functions on FPGAs Department of Electrical& Electronic Engineering, University College Cork, Ireland.
  10. Stephen Barlett, "Lecture on quantum computing," NITP Summer School, Adelaide, Australia, 2003.
  11. M. A. Nielsen and I. L. Chuang, "Quantum Computation And Quantum Information," Cambridge University Press, 2002.
  12. W. Stallings, Cryptography and Network Security Principles and Practice, Second Edition, Prentice HallInternational, 1999. US NIST, Descriptions of SHA-256, SHA-384 and SHA-512, http://csrc. nist. gov/encryption/shs/sha256-384-5I2. pdf , 2001.
  13. Implementation ofSecure Key Distribution BasedOn Quantum Cryptography
  14. Quantum Cryptography For Secure Satellite Communications, Richard J. Hughes*, William T. Buttler, Paul G. Kwiat, Steve K. Lamoreaux,
  15. Chaotic Quantum Cryptography Stamatios V. Kartalopoulos,The Fourth International Conference on Information Assurance and Security
  16. Zhizhong Yan; Meyer-Scott, E. ; Bourgoin, J. ; Higgins, B. L. ; Gigov, N. ; Macdonald, A. ; Hubel, H. ; Jennewein, T. , "Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution Over Free Space and Satellite Links," Lightwave Technology, Journal of , vol. 31, no. 9, pp. 1399,1408, May1, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Classical Cryptography Quantum techniques Authentication Hacker.