Open Access   Article Go Back

Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key

N. Srilatha1 , M. Deepthi2 , I.R. Reddy3

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-2 , Page no. 15-19, Feb-2017

Online published on Mar 01, 2017

Copyright © N. Srilatha, M. Deepthi , I.R. Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Srilatha, M. Deepthi , I.R. Reddy, “Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.2, pp.15-19, 2017.

MLA Style Citation: N. Srilatha, M. Deepthi , I.R. Reddy "Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key." International Journal of Computer Sciences and Engineering 5.2 (2017): 15-19.

APA Style Citation: N. Srilatha, M. Deepthi , I.R. Reddy, (2017). Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key. International Journal of Computer Sciences and Engineering, 5(2), 15-19.

BibTex Style Citation:
@article{Srilatha_2017,
author = {N. Srilatha, M. Deepthi , I.R. Reddy},
title = {Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2017},
volume = {5},
Issue = {2},
month = {2},
year = {2017},
issn = {2347-2693},
pages = {15-19},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1170},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1170
TI - Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key
T2 - International Journal of Computer Sciences and Engineering
AU - N. Srilatha, M. Deepthi , I.R. Reddy
PY - 2017
DA - 2017/03/01
PB - IJCSE, Indore, INDIA
SP - 15-19
IS - 2
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
784 656 downloads 563 downloads
  
  
           

Abstract

The Privacy is paramount when communicating subtle information, and humans have devised some unusual ways to encode their conversations. The Quantum Key Distribution agrees for the secure transmission of unbreakable encryption keys and it provides a flawless secure coding to solve the problem of key distribution. At present this is more mature application in the field of quantum computing. The fundamental concept of this protocol involves two parties, wishing to exchange a key both with access to a classical public communication channel and a quantum communication channel. The entanglement distillation approach of BB84 is widely used because the act of reading a quantum bit (QuBits) changes the bit, it is difficult for hackers to interfere without being detected sufficient number of bits. But this technique uses only four directions of electron movements so it is possible to guess the key. To overcome these drawbacks here two level QRNA technique is proposed for security. In first level DNA is applied on plain text after BB84 protocol is applied. This method provides better security than both BB84 protocol and DNA alone.

Key-Words / Index Term

BB84 protocol, Quantum Cryptography (QC), DNA, QDNA and QuBits

References

[1] B.Jyoshna”Mechanisms for secure data transmission A Survey”, Published in International of Computer Science and Engineering(IJCSE), Vol.-2(8), PP(82-83) August 2014.
[2] R.Shah and Y. S. Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2(1),pp. 22-28, Feb 2014
[3] Alia, M.A., Yahya,A., “Public–Key Steganography Based on Matching Method”, European Journal of Scientific Research, Vol(2), PP223-231 Aug (2010).
[4] G. Cui, L. Qin, Y. Wang and X. Zhang, “An encryption scheme using DNA technology”, Bio Inspired Computing: Theories and Applications, pp. 37-42, 2008.
[5] Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories and Applications,Vol-46 pp.23- 30,may 2008.
[6] E Suresh Babu, C Nagaraju, MHM Krishna Prasad “Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism” published in Procedia Computer Sciencedec-. Vol-70PP:341-347 , Oct 2015.
[7] Ashok Sharma, R S Thakur and Shailesh Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol. 4(5), pp.5-11, Oct 2016
[8] R Pradeep Kumar Reddy, C Nagaraju, N Subramanyam ”Text encryption through level based privacy using dna steganography” published in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,vol-3 PP168-172,May-jun 2014.
[9] Mamta Rani1 and Sandeep Jain,”DNA Computing and Recent Developments”. International journal of computer science and Engineering, Vol.2, PP.16-19,April 2014.
[10] Kritika Gupta, “ DNA Based Cryptographic Techniques: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering,vol(3), pp. 607-610, March 2013.
[11] Komal Kumbharkar, “An improved Symmetric key cryptography with DNA based strong cipher”, international journal of advanced and innovative research, (IJCSE) ,Vol(2),PP2278-7844,May-jun2013.
[12] Sharmeen kaur, Raveena Singh and Shivya Gagneja “Network Security and Methods of Encoding and Decoding”. International journal of computer science and Engineering, Vol.-2(2), pp (11-15) Feb 2014.
[13] Pallab Banerjee1 and Anita Kumari2,Puja Jha3 “Comparative Performance Analysis of Optimized Performance Round Robin Scheduling Algorithm(OPRR) with AN Based Round Robin Scheduling Algorithm using Dynamic Time Quantum in Real Time System with Arrival Time”. International journal of computer sciences and Engineering, Vol.-3(5), pp. 309-316, May 2015.
[14] Azarderakhsh, mehran mozaffar kermani, David jao,”post quantum cryptography on FPGA based on isolegines on elliptic curves” IEEE journal,VOL(64),pp86-99,2017