Improving BB84 in Quantum Encryption
Abstract
Today, information security plays a key role in communications and exchanges. Until now Various approaches including: Quantum encryption and Quantum key Distribution (QKD), have been utilized for information security, that act based on Quantum Mechanic principles, so that if one tries to hear the information, it will be detected via increasing error rate in receiver part. BB84 is one of secure algorithms in quantum encryption area, bearing less error rate in comparison to other quantum algorithms. The goal of the paper is to improve the algorithms as much as possible in order to defend the attacks. We use a hybrid key to accomplish the task in which we add authentication and time limit beside the QKD key.Downloads
References
A. M. Shaikha, and P. D. Shah, “BB84 and Identity Based Encryption (IBE) Based a Novel Symmetric Key
Distribution Algorithm,” Elsevier journal, 2012.
A. Mahmoud Abbas, A, Goneid, and Sh, El-Kassas, “Privacy Amplification in Quantum Cryptography BB84 using
Combined Univarsal2-Truly Random Hashing,” International Journal of Information and Network Security (IJINS),
(2)98-115, 2014.
B. Santhi, K.S. Ravichandran, A. P. Arun, and L. Chakkarapani, “A Novel Cryptographic Key Generation Method
Using Image Features,” Research Journal of Information Technology, 4(2), pp. 88-92, 2012.
B. Tanmay, H. Sirshendu, M. Ayan, and S. R. Bhadra Chaudhuri, “A novel data encryption technique by genetic
crossover of robust biometric key and session based password,” International. J. Network Secur. Appl. (IJNSA), 3(2),
pp. 111-120, 2011.
C. Bennet, and G. Brassard, “Quantum cryptography,” IEEE. International Conference on computer. System and
processing. Bangalore. India. N.Y, p175, 1992.
C. Bennet, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum Cryptography,” Journal of
cryptography, 1992.
C. Elliot, and D. Pearson, “Quantum Cryptography in Practice,” IEEE, optics letter, vol. 91, NO.6, PP 35-40, 2003.
C. Kollmitzer, and M. Pivk, “Applied Quantum Cryptography,” Springer, 2010.
D. N. Kartheek, O. P. Kumar, and S. Srujan, “Security Using BB84 Quantum Key Distribution Protocols. IJARCSSE
All Rights Reserved,” 2012.
H. Schildt, “The Complete Reference Java,” Seventh Edition, McGraw-Hill, 2007.
J. Katz, “Digital Signatures,” 1st ed, 2nd Printing, pp. 3-33 & 87-119, 2010.
M. R. Ogiela, and L. Ogiela, “Image based cryptobiometric key generation,” Third International Conference
on Intelligent Networking and Collaborative Systems (INCoS), AGH Univ. Sci. Technol, Krakow, Poland, pp. 673-
, 2011.
N.V. Chetty, B. Abhijith, G. Nihar, and P. M. D. Raj Vincent, “Modified Novel Quantum Key Exchange using
BB84 Algorithm,” International Journal of Engineering and Technology, 5(3)2451-2454, 2013.
P. Marrand, and D. Townsend, “Quantum key distribution over distance as long as 30km,” vol. 20, no.15, pp.
-1697, 1995.
R. Ursin, “Entanglement-based quantum communication over 144km,” Nature Physics, pp. 481-486, 2007.
S. Fengxi, G. Zhongwei, M. Dayong, “Feature Selection Using Principal Component Analysis,” ICSEM, 1:
-30, 2010.
W. Lifang, L. Xingsheng, Y. Songlong, and X. Peng, “A novel key generation cryptosystem based on face
features,” IEEE 10th International Conference on Signal Processing, pp. 1675-1678, 2010.
Y. Jeong, “Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols,”
Department of Physics, Pohang University of Science and Technology (POSTECH), Pohang, 790-784, Korea. February
, 2010.
Y. Kai-zhi, C. Ying-lei, and J. Liu, “A method for extracting the text feature of SAR image based on cooccurrence matrix,” 4th International Congress on Image and Signal Processing (CISP), Telecommun. Eng. Inst., Air Force Eng. Univ., Xi'an, China, 4: 2038-2043, 2011.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
TRANSFER OF COPYRIGHT
JISCT is pleased to undertake the publication of your contribution to Journal of Information Sciences and Computing Technologies
The copyright to this article is transferred to JISCT(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JISCT all rights for the work so that both parties may be protected from the consequences of unauthorized use.