CFP last date
20 May 2024
Reseach Article

A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview

Published on March 2014 by G. Srinivasa Rao, B. Sujatha, S. Nagaprasad������
International Conference on Advances in Computer Engineering and Applications
Foundation of Computer Science USA
ICACEA - Number 4
March 2014
Authors: G. Srinivasa Rao, B. Sujatha, S. Nagaprasad������
9f755c4d-d1e8-4154-a255-79374e27dcc9

G. Srinivasa Rao, B. Sujatha, S. Nagaprasad������ . A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview. International Conference on Advances in Computer Engineering and Applications. ICACEA, 4 (March 2014), 4-7.

@article{
author = { G. Srinivasa Rao, B. Sujatha, S. Nagaprasad������ },
title = { A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview },
journal = { International Conference on Advances in Computer Engineering and Applications },
issue_date = { March 2014 },
volume = { ICACEA },
number = { 4 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 4-7 },
numpages = 4,
url = { /proceedings/icacea/number4/15632-1435/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Engineering and Applications
%A G. Srinivasa Rao
%A B. Sujatha
%A S. Nagaprasad������
%T A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview
%J International Conference on Advances in Computer Engineering and Applications
%@ 0975-8887
%V ICACEA
%N 4
%P 4-7
%D 2014
%I International Journal of Computer Applications
Abstract

Quantum Cryptography is also a Promising Approach visible of final Quantum Computers existence. it is a singular study Technique that provides us a singular secret Protocol that cannot be glorious by anybody. Quantum Cryptography holds foot on laws of Physics The quantum physics Law, however not as like that we have a tendency to area unit victimization addition, multiplication kind of arithmetic Puzzles used in PGP (Pretty smart Privacy). Quantum Cryptography will stand as a mile stone and cannot be challenged by future advancements throughout this field; if truth be told they'd be suggesting it as a certain communication protocol channel. enable us to careful derive the functions that provides a full account of the operational characteristics of a general QKD system. We wish to analyze specifically created to characterize the Bennett-Brassard Four-State (BB84) QKD protocol plenty of precisely, a group of generalizations that embrace the primary BB84 protocol as a special case, where the sender and so the receiver may take overtime in their alignment.

References
  1. AppliedQuantumCryptography Volume 797 of Lecture Notes in Physics, ISSN 0075-8450
  2. Quantum Cryptography and Secret-Key Distillation By Gilles Van Assche
  3. Ryszard Horodecki, Sergei Ya Kilin, J. Kowalik IOS Press, 01-Jan-2010 - Political Science
  4. Dirk Bouwmeester, Artur K. Ekert, Anton Zeilinger Springer, 2000 – Computers
  5. Giuliano Benenti, Giulio Casati, Giuliano Strini World Scientific Pub. , 2007 – Computers
  6. Noson S. Yanofsky, Mirco A. Mannucci Cambridge University Press, 11-Aug-2008 – Computers
  7. Julian Brown Simon and Schuster, 05-Apr-2002 – Computers
  8. Sir Roger Penrose Oxford University Press, 04-Mar-1999 – Computers
Index Terms

Computer Science
Information Sciences

Keywords

Qc (quantum Cryptography) Qkd (quantum Key Distribution) Quantum Mechanics Pgp (pretty Good Privacy) Sender Receiver Intruder Alice Bob Eve Photon Bb Protocol (bennet And Armour Plate Protocol) hilbert Space Aer(average Error Rate) single Photon Noise Rate Ge(germanium) ingaas(indium-gallium Arsenide)