A Secure Method of Communication Through BB84 Protocol in Quantum Key Distribution
-
Published:2024-01-04
Issue:1
Volume:25
Page:21-33
-
ISSN:1895-1767
-
Container-title:Scalable Computing: Practice and Experience
-
language:
-
Short-container-title:SCPE
Author:
Anilkumar ChunduruORCID,
Lenka SwathiORCID,
Neelima N.,
V E Sathishkumar
Abstract
Security awareness is one of the most pressing topics in today's globe. The idea of cryptography is introduced when the subject is information security. Conventional cryptography-based security techniques rely on the presumption that keys are shared before secure connections. The most crucial factor to consider when integrating cryptographic operations into account when integrating cryptographic operations in with any system is the safe key management strategy required for sending and transferring a secret key between two entities The systems will be vulnerable to bugs and possibly fatal external assaults if the fundamental management methods are poor A method for securely encrypting data sent between parties is quantum cryptography. and spotting eavesdroppers trying to overhear the conversation. Quantum cryptography may be the solution to these issues a quantum cryptography application, Quantum Key Distribution (QKD), refers to the production of a cryptographic key with unconditional security assured by physical rules. Quantum cryptography is a kind of encryption. We examine the quantum key exchange protocol (BB84 protocol) in this study and the way that it significantly improves data transfer security when compared to standard encryption techniques. The main objective of quantum cryptography is to offer a trustworthy way to provide a secure method of communication between the intended peers only and to detect the Eavesdropper presence.
Publisher
Scalable Computing: Practice and Experience
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Quantum Cryptography;Advances in Computational Intelligence and Robotics;2024-03-04