5 research outputs found

    Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication

    Get PDF
    Classical cryptography is mainly about the challenge to compute the secret key using current computing system. We tend to hide our information from being stealing by others. In order to do so, in this research paper we are proposing a method that use the law of physics in communication in terms of cryptography and key distribution by applying quantum theorems and principle. Using BB84 protocol as a base in quantum key distribution together with the implementation of tight finite key that compress the Shannon entropy and Von Neumann theory. Our multiparty system would be a new area of authentication. Throughout this paper, we are going to prove that our method will give a small error rate between the initial key rates with the final key rate then will impact the attack resilient. Yet the key cannot be formed and transferred simply

    QuCCs: an experimental of quantum key distribution using quantum cryptography and communication simulator

    Get PDF
    The applications of quantum information science move towards bigger and better dimensions for the next generation technology. In the field of quantum cryptography and quantum computation, the world already witnessed various groundbreaking tangible products and promising results. Quantum cryptography is one of the mature fields of quantum mechanics and the devices are already available in the markets. In order to reach the heights of digital cryptography, the current state of quantum cryptography is still under various researches. However, the complexity of quantum cryptography is high due to combination of hardware and software. The lack of effective simulation tool to design and analyze the quantum cryptography experiments delays the reaching distance of the success. Therefore, in this paper, a framework to achieve an effective single photon based quantum cryptography simulation tool is proposed. The limitations of a commercial photonic simulation tool based experiments are also highlighted. Finally, the ideas for achieving one-stop simulation package for quantum based secure key distribution experiments are discussed. The proposed modules of simulation framework have been analyzed from the programming perspective

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure

    Get PDF
    The aim of this study was to propose a unique communication protocol for authentication scheme for cloud infrastructure in replacing the key distribution technique based on public key infrastructure to achieve unconditional security in cloud with enhanced tight finite key. Currently, there are certain issues pertaining to confidentiality, integrity and authenticity in cloud systems. In our research we propose the use of quantum theory to transfer the authentication key via quantum channel. Referring to quantum theory, every key that we transform into bits cannot be cloned. This QKD protocol is believed to be able to detect any eavesdropping activities and provide an effective security. The Quantum Key Distribution (QKD) protocol used the concept of Multiparty QKD (MQKD) which allows the same key to be distributed to different parties based on quantum mechanism. A quantum key server generates a secret key that may strengthen the security aspects. A quantum key distribution key scheme is imposed in the cloud network to secure the top-secret message or information and capture the eavesdropper. The existence of quantum key storage between the cloud provider and cloud client may guarantee the integrity of communication process that ensures the party is authenticated and the communication cannot be intercepted. We propose the enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. The main attraction is to provide a secure channel between a cloud client to establish a connection among them by applying the theories from Von Neumann and Shannon entropies and also Shor's algorithm. By generalizing these theories we will produce enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. The result shows that our proposed method could improve the error rate. This is due to any noise, interference, distortion or bit synchronization during the transmission of the initial key that error rate can be slightly reduced the error rate by implementing our new scheme. In other words it can push aside any interference during the key transmission. Our result shows the authentication level is increased to 30% compared to existing methods proposed by other researchers. In general, the current authentication scheme being used is still relatively backward methods especially in cloud environment. Many of the key aspects of authentication cannot guarantee effective control, especially in data transmission via a public channel. From the result we can see there is a significant result on reducing the error rate, enhanced the authentication level and reduce the possibility of any kind of threat. The simulation results show that our proposed scheme provides a strong authentication mechanism. It shows by the low amount of error rate while the key is distributes among others. In addition, our results show that the proposed scheme could reduce amount of information leak

    Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure

    Get PDF
    This research is introducing an enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. The main attraction is to provide a secure channel between a cloud client to establish a connection among them by applying the theories from Von Neumann and Shannon entropies and also Shor's algorithm. By generalizing these theories we will produce enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. We are proposing an authentication of multi-party Quantum Key Distribution (MQKD) protocol using an enhanced tight finite key scheme because it will involve a number of parties in cloud infrastructure. Significant of this research is to reduce the possibility of losing a private key by producing a high efficient key rate and attack resilient

    Cloud computing security threat with quantum key distribution defense model

    No full text
    Cloud computing offer the cost-effective and flexibility to the user. However, the security threat is a main concern for user to place their data in the cloud. Data that stored and shares through cloud have to be confidential and restricted. Information leakage, men in the middle attack are the two main issues that make information stored in the cloud insecure. Widely authentication method used is the classical approach like Public Key Infrastructure (PKI). This approach is workable in order to provide a secure environment within the cloud clients. The existing of Certificate Authority that act as controller they can verify the legal user. However, in certain circumstances, this approach cannot solve the issue such as stealing the identity. In this paper we are proposing a model that use quantum mechanical theory. This theory is supporting the no cloning theory. It used the power of light and a single photon to provide an authentication key. Throughout this paper, we also do a literature on various security threats, and authentication method in cloud. Then, we are introducing a quantum defense model as a solution of the listed threats. We proposed new cloud authentication architecture for cloud computing environment. A new cloud authentication environment that implements quantum mechanics is proven that can gain more trust with less time of computation in cloud communications
    corecore