CFP last date
22 April 2024
Reseach Article

The View of a Better Implementation of Practical - Quantum Cryptographic Architecture

Published on March 2014 by S. Nagaprasad, G. Srinivasa Rao, B. Sujatha
International Conference on Advances in Computer Engineering and Applications
Foundation of Computer Science USA
ICACEA - Number 5
March 2014
Authors: S. Nagaprasad, G. Srinivasa Rao, B. Sujatha
0954d529-7e6e-4fca-aa55-b01822d5af15

S. Nagaprasad, G. Srinivasa Rao, B. Sujatha . The View of a Better Implementation of Practical - Quantum Cryptographic Architecture. International Conference on Advances in Computer Engineering and Applications. ICACEA, 5 (March 2014), 32-35.

@article{
author = { S. Nagaprasad, G. Srinivasa Rao, B. Sujatha },
title = { The View of a Better Implementation of Practical - Quantum Cryptographic Architecture },
journal = { International Conference on Advances in Computer Engineering and Applications },
issue_date = { March 2014 },
volume = { ICACEA },
number = { 5 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 32-35 },
numpages = 4,
url = { /proceedings/icacea/number5/15645-1437/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Engineering and Applications
%A S. Nagaprasad
%A G. Srinivasa Rao
%A B. Sujatha
%T The View of a Better Implementation of Practical - Quantum Cryptographic Architecture
%J International Conference on Advances in Computer Engineering and Applications
%@ 0975-8887
%V ICACEA
%N 5
%P 32-35
%D 2014
%I International Journal of Computer Applications
Abstract

Quantum Key Distribution (Q. K. D. ) provides us a protected communication channel. In present days we have some latest problems existing in Quantum key distribution. Let us look in to the Quantum key distribution Research analysis which provides us the Information about BB84 Protocol, using reducing laser light is used as a Photon Source, Protected keys could not be generated. The reason is it's weakness towards a Photon Number Splitting (PNS) attack which we call it as Sequential Unambiguous State Discrimination (USD) attack. We need to generate the keys with more secured mechanism.

References
  1. Code talker by Joseph Bruchac
  2. Cryptonomicon by Neal Stephenson
  3. Cryptonomicon by Neal Stephenson
  4. Top secret Ultra byPeter Calvocoressi
  5. U-571 by Max Allan Collins
  6. Super computers by Rajaraman
  7. A computer Laboratory Referral forDeploma by Jagadeesh,T. R
  8. A-Z Nano computer by Albert Shawn
  9. Advances in Computational Optimizationand its byKalyanmoyDeb
  10. Architecture,Programming and Application of vy A. K. Ganguly
  11. Basic Computation amd Principles and Computer by E. Balaguruswamy
  12. http://www. etsi. org/technologies-clusters/technologies/quantum-key-distribution
  13. http://gcn. com/articles/2013/10/29/how-quantum-key-distribution-works. aspx
  14. http://arxiv. org/abs/quant-ph/0012056
  15. http://iopscience. iop. org/1367-2630/4/1/341
  16. http://www. sciencemag. org/content/283/5410/2050. short
  17. http://en. wikipedia. org/wiki/Quantum_cryptography
  18. A Few Words on Secret Writing byEdgar Allan Poe
  19. http://www. newsfix. ca/2013/11/17/university-research-teams-new-approach-enhances-quantum-based-secure-communication
  20. http://arxiv. org/abs/quant-ph/0012056
  21. http://prl. aps. org/abstract/PRL/v91/i5/e057901
  22. http://iopscience. iop. org/1367-2630/4/1/341
  23. http://www. sciencemag. org/content/283/5410/2050. short
  24. http://www. pcadvisor. co. uk/news/security/3494723/quantum-crypto-standard-private-key-blended-for-first-time/
  25. http://www. scienceagogo. com/news/20131108232216. shtml
  26. http://news. idg. no/cw/art. cfm?id=AEA6F636-0149-5FB9-4E000A404DA37981
  27. http://www. poynter. org/how-tos/digital-strategies/234005/how-journalists-can-encrypt-their-email/
  28. http://www. prnewswire. com/news-releases/gridcom-technologies-unhackable-encryption-technology-named-in-popular-science-magazines-20-ideas-that-will-change-the-world-236538341. html
Index Terms

Computer Science
Information Sciences

Keywords

Quantum Key Distribution (q. k. d. ) Bennet And Armour Plate Protocol (bb84 Protocol) Photon Number Splitting (pns) Unambiguous State Discrimination (usd) Differential Phase Shift Quantum Key Distribution (dps-quantum Key Distribution) Protected Key Rate (pkr) General Collective Attacks (gca) Specific Collective Attack (sca) Photon Number Splitting (pns) Quantum Non-demolition Measurement (qndm) Projective Measurement (pm) Electro-absorption Modulator(eam) Dispersion Shifted Fiber (dsf)