Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique

The work presents in this paper proposes to solve the existing issue of initial qubit (primary key) lost due to an attack by eavesdropper, causing the quantum bit error rate (QBER) to be high which may leaked enough information to the eavesdropper during secret key sharing in network communication. We intend to greatly reduce the QBER to a reasonable percentage that will make the key sharing communication more secured and effective. We use the dual quantum channels against the traditional single quantum channel. The dual channels give an upper hand to reduce the chances of error caused by eavesdropper. Simulations were conducted for varying the noise factor which is a measure of the presence of an eavesdropper. The results where compared between our proposed method and the one quantum channel model. Our method shows an almost half of the QBER reduced during the secret key sharing session.

[1]  Karolin Papst Principles Of Quantum Computation And Information , 2016 .

[2]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[3]  Masahito Hayashi,et al.  Quantum computation and information : from theory to experiment , 2006 .

[4]  Pedram Khalili Amiri,et al.  Quantum computers , 2003 .

[5]  Gui-Lu Long,et al.  Duality quantum information processing , 2010, 2010 Sixth International Conference on Natural Computation.

[6]  Scott Aaronson,et al.  The Limits of Quantum Computers , 2007, CSR.

[7]  C. Anghel,et al.  Development and Simulation of Quantum Cryptographic Protocols , 2013 .

[8]  Zhang Xiao,et al.  An Improved Method of Quantum Key Distribution Protocol , 2009, 2009 International Forum on Computer Science-Technology and Applications.

[9]  Michael B. Mensky,et al.  Everett Interpretation and Quantum Concept of Consciousness , 2013 .

[10]  David McMahon Quantum Computing Explained , 2007 .

[11]  Giuliano Benenti,et al.  Principles of Quantum Computation And Information: Basic Tools And Special Topics , 2007 .

[12]  Anand Sharma,et al.  Security of entanglement based version of BB84 protocol for Quantum Cryptography , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[13]  Masahito Hayashi,et al.  Quantum Computation and Information , 2006 .

[14]  Giuliano Benenti,et al.  Principles of Quantum Computation and Information:Volume II: Basic Tools and Special Topics , 2007 .

[15]  Moses Garuba,et al.  Research Directions in Quantum Cryptography , 2007, Fourth International Conference on Information Technology (ITNG'07).

[16]  Pramode K. Verma,et al.  A QKD protocol with a two-way quantum channel , 2011, 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS).

[17]  William Stallings,et al.  Cryptography and network security , 1998 .

[18]  Stamatios V. Kartalopoulos,et al.  Fast convergent key distribution algorithms using a dual quantum channel , 2009, Secur. Commun. Networks.

[19]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[20]  Stamatios V. Kartalopoulos,et al.  Key Distribution Using Dual Quantum Channels , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[21]  Jie Xu,et al.  Enhancing Grid Security using Quantum Key Distribution , 2012 .

[22]  Giuliano Benenti,et al.  Principles of Quantum Computation and Information - Volume I: Basic Concepts , 2004 .

[23]  Thomas Baignères Quantum Cryptography : On the Security of the BB84 Key-Exchange Protocol , 2003 .

[24]  Archil Avaliani,et al.  Quantum Computers , 2004, ArXiv.

[25]  Mihnea Dulea,et al.  Classical and quantum communications in grid computing , 2010 .

[26]  C. Anghel Research, Development and Simulation of Quantum Cryptographic Protocols , 2013 .

[27]  Ronald I. Frank,et al.  A feasibility study: secure public key infrastructure with quantum key distributions in grid computing , 2007 .