IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 3    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 3,March 2012
Security Using Quantum Key Distribution Protocols (QKDPs
Full Text(PDF, )  PP.21-25  
D N Kartheek, M Abhilash Kumar, M R Pavan Kumar
: BB84 Protocol, QKD Protocol Implementation, Quantum Cryptography, Qubits
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communication based on quantum mechanics. This work presents quantum key distribution protocols (QKDP) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography
[1] Lelde Lace, Oksana Scegulnaja-Dubrovska, Ramuns Usovs, Agnese Zalcmane, “Quantum Cryptographic Key Distribution Protocols”, The European Social Fund(ESF), 2008.

[2] Quantum Key Distribution Protocols: A Survey.

[3] Tzonelih Hwang, Kuo-Chang Lee, chuan-Ming Li, “Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols,” IEEE Transactions on Dependable and Secure Computing, vol. 4, No. 1, January-March 2007.

[4] Rajni Geol, Moses Garuba and Anteneh Girma, “ Research Directions in Quantum Cryptography”, International Conference on Information technology, 2007.

[5] Chi-Hang Fred Fung, Hoi-Kwong Lo, “A survey on quantum cryptographic protocols and their security”, IEEE, 2007.

[6] Wikipedia,http://en.wikipedia.org/wiki/Quantum_cryptogr phy “Quantum Cryptograpxhy”.

[7] http://swissquantum.idquantique.com/?Key-Sifting

[8] W.Stallings, Cryptography and Network Security: Principles and Practice 3/e. Prentice Hall, 2003.

Untitled Page