Nowadays security in communication is increasingly important to the network communication because many categories of data are required restriction on authorization of access, modify, delete and insert. Quantum cryptography is one of the solutions that use property of polarization to ensure that transmitted data is not tampered. The research paper provides the mechanism that enhances the data security in quantum cryptography during exchange of information. In first phase detailed explanation of Quantum key distribution’s BB84 protocol is given. BB84 protocol is used as the basis for the mechanism. In next phase the proposed mechanism is explained. The proposed mechanism combines BB84 protocol at two levels, from sender to receiver and then from receiver to sender. Moreover, a logic circuit is used to combine the bits hence to reduce the probability of eavesdropping. The key obtained can be used to exchange the information securely further it can help in encryption and decryption of crucial data. Double level BB84 mechanism will help in information reconciliation as well as privacy amplification. In future the proposed mechanism will be very beneficial where unconditional security is required during key and other secret information exchange
[1]
Z. Yuan,et al.
Quantum key distribution over 122 km of standard telecom fiber
,
2004,
quant-ph/0412171.
[2]
Gilles Brassard,et al.
Secret-Key Reconciliation by Public Discussion
,
1994,
EUROCRYPT.
[3]
Alan Mink,et al.
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
,
2010,
ArXiv.
[4]
Ching-Nung Yang,et al.
Enhanced Quantum Key Distribution Protocols Using BB 84 and B 92
,
2003
.
[5]
P. Busch,et al.
Heisenberg's uncertainty principle
,
2006,
quant-ph/0609185.
[6]
G. Buller,et al.
Quantum key distribution system clocked at 2 GHz.
,
2005,
Optics express.
[7]
Gilles Brassard,et al.
Experimental Quantum Cryptography
,
1990,
EUROCRYPT.
[8]
Gilles Brassard,et al.
Quantum Cryptography
,
2005,
Encyclopedia of Cryptography and Security.
[9]
N. Gisin,et al.
Quantum cryptography
,
1998
.
[10]
John Preskill,et al.
Security of quantum key distribution with imperfect devices
,
2002,
International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[11]
Quantum Key Distribution via BB 84 An Advanced Lab Experiment
,
2006
.