152 end to end encryption using qkd algorithm

4
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www End to End E N. Ab Department of BCA & MSC.SS, Sri ABSTRACT Today nearly all of the people are communicating each other with the h communication. Nearly three fourth of connected via social media. So it is ver secure the data transmission between th addition to this future of computer's Quantum technologies. So the In this going to see how to increase the secu transmission through Quantum shif algorithm. In this paper idea implementation of this most advan encryption by Quantum Key Distributio importance of quantum cryptography in Keyword: Quantum Cryptography, On Quantum Key Distribution (QKD) I. INTRODUCTION We have seen lot of communication po network but the securities of those por do much to the people. If there occurs security numerous data of our prope washed out. Though there are lot methods available today, that gives high such as in online payment proced important document via social media, m communication. Everything that are se communication is encrypted. Today the types of encryptions are being used, lik In encryption a plaintext is modified character and numbers, which is then communication channel. The converted cipher text, this is again converted ba plain form when received. Between the t holds a major role for converting the ci future of digital communication relay o computers. When quantum computers h day to day life, the encryption meth today will be no longer safer. nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct Encryption using QKD Algorit birami 1 , M. Sri Nivetha 2 , S. Veena 2 1 Assistant Professor, 2 Student i Krishna Arts & Science College, Kuniyamuthu e involved in help of online the world are ry important to he user. And in will be of by paper we are urity of online ft distribution outlines the nced level of on method and future. nline Security, ortals in digital rtals are mean any fissure in erties will be of encryption h level security dures, sharing military related end via digital ere are various ke AES, RSA. into different transmitted in d text is called ack to original transitions key ipher text. The on the quantum hold a place in hods available So Quantum cryptography pays way for th based on the law of Phys between the two parties. On application. Whatsapp is usin which is through RSA algorit computers comes in place method algorithm lacks accura of data between communicatio quantum cryptography is in shortcoming accompanied in p the major advantage of Quan that when a third party is try transition automatically send breach is broken down. Even valuable vote by Quantum Enc Quantum key distribution ( algorithms that can be implem security portal. It uses quantum generate random secret key communication. The random encrypt and decry-pt the tex QKD has the property of dete to access the key. II. METHODOLOGY QKD involves sharing rando sender and receiver. T eavesdroppers to make absol very low. Random bits are encrypt and decry-pt text parties. Because everything se photons as shown in Figure 1. For instance two parties are When Alice sends a message Bob to chooses card of same r display, otherwise he reads co bob reads the complete photo evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 936 thm ur, Coimbatore, India he ultimate security. It is sics. Ensuring privacy ne of the leading social ng end to end encryption thm. But when quantum of present one, RSA acy and leads to leakage on. So the importance of n hike to reduce the present methods. One of ntum key distribution is ying to get data between der gets alert, so that Switzerland protects its cryption [1]. (QKD) is one of the mented to strengthen the m mechanics property to for guaranteeing secure m secret key is used to xt message[2]. As said ecting third party trying om it sequence between The probability for lute breach those bits is e employed as tool to message between two end is being converted to e taken Alice and bob. at random value, and if random value message is ompletely wrong. When ons, shifting takes place

Upload: others

Post on 01-Feb-2022

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 152 End to End Encryption Using QKD Algorithm

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

End to End Encryption uN. Abirami

Department of BCA & MSC.SS, Sri Krishna Arts & Science College,

ABSTRACT Today nearly all of the people are involved in communicating each other with the help of online communication. Nearly three fourth of the world are connected via social media. So it is very important to secure the data transmission between the user. And in addition to this future of computer's will be of by Quantum technologies. So the In this paper we are going to see how to increase the security of online transmission through Quantum shift distribution algorithm. In this paper idea outlines the implementation of this most advanced level of encryption by Quantum Key Distribution method and importance of quantum cryptography in future. Keyword: Quantum Cryptography, Online Security, Quantum Key Distribution (QKD) I. INTRODUCTION We have seen lot of communication portals in digital network but the securities of those portals are mean do much to the people. If there occurs any fissure in security numerous data of our properties will be washed out. Though there are lot omethods available today, that gives high level security such as in online payment procedures, sharing important document via social media, military related communication. Everything that are send via digital communication is encrypted. Today there are various types of encryptions are being used, like AES, RSA. In encryption a plaintext is modified into different character and numbers, which is then transmitted in communication channel. The converted text is called cipher text, this is again converted back to original plain form when received. Between the transitions key holds a major role for converting the cipher text. The future of digital communication relay on the quantum computers. When quantum computers hold a place in day to day life, the encryption methods available today will be no longer safer. So Quantum

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Encryption using QKD Algorithm

N. Abirami 1, M. Sri Nivetha2, S. Veena2 1Assistant Professor, 2Student

Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore

Today nearly all of the people are involved in communicating each other with the help of online communication. Nearly three fourth of the world are connected via social media. So it is very important to

a transmission between the user. And in addition to this future of computer's will be of by Quantum technologies. So the In this paper we are going to see how to increase the security of online transmission through Quantum shift distribution

this paper idea outlines the implementation of this most advanced level of encryption by Quantum Key Distribution method and importance of quantum cryptography in future.

Quantum Cryptography, Online Security,

We have seen lot of communication portals in digital network but the securities of those portals are mean do much to the people. If there occurs any fissure in security numerous data of our properties will be washed out. Though there are lot of encryption methods available today, that gives high level security such as in online payment procedures, sharing important document via social media, military related communication. Everything that are send via digital

here are various types of encryptions are being used, like AES, RSA. In encryption a plaintext is modified into different character and numbers, which is then transmitted in communication channel. The converted text is called

verted back to original plain form when received. Between the transitions key holds a major role for converting the cipher text. The future of digital communication relay on the quantum computers. When quantum computers hold a place in

encryption methods available today will be no longer safer. So Quantum

cryptography pays way for the ultimatebased on the law of Physics. Ensuring privacy between the two parties. One of the leading social application. Whatsapp is using end to end encryption which is through RSA algorithm.computers comes in place of present one,method algorithm lacks accuracy and leads to leakage of data between communication. So the importance of quantum cryptography is in hike to reduce the shortcoming accompanied in present methods. One of the major advantage of Quantum key distribution ithat when a third party is trying to get data between transition automatically sender gets alert, so that breach is broken down. Even Switzerland protects its valuable vote by Quantum Encryption [1]. Quantum key distribution (QKD) is one of the algorithms that can be implemented to strengthen the security portal. It uses quantum mechanics property to generate random secret key for guaranteeing secure communication. The random secret key is used to encrypt and decry-pt the text message[2]. As said QKD has the property of detecting third party trying to access the key. II. METHODOLOGY QKD involves sharing random it sequence between sender and receiver. The probability for eavesdroppers to make absolute breach those bits is very low. Random bits are employed asencrypt and decry-pt text message between two parties. Because everything send is being converted to photons as shown in Figure 1. For instance two parties are taken Alice and bob.When Alice sends a message at random value, and if Bob to chooses card of same random value message is display, otherwise he reads completely wrong. When bob reads the complete photons, shifting takes place

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 936

sing QKD Algorithm

Kuniyamuthur, Coimbatore, India

the ultimate security. It is based on the law of Physics. Ensuring privacy between the two parties. One of the leading social application. Whatsapp is using end to end encryption which is through RSA algorithm. But when quantum computers comes in place of present one, RSA method algorithm lacks accuracy and leads to leakage of data between communication. So the importance of quantum cryptography is in hike to reduce the shortcoming accompanied in present methods. One of the major advantage of Quantum key distribution is that when a third party is trying to get data between transition automatically sender gets alert, so that breach is broken down. Even Switzerland protects its valuable vote by Quantum Encryption [1].

Quantum key distribution (QKD) is one of the ms that can be implemented to strengthen the

security portal. It uses quantum mechanics property to generate random secret key for guaranteeing secure communication. The random secret key is used to

pt the text message[2]. As said the property of detecting third party trying

QKD involves sharing random it sequence between sender and receiver. The probability for eavesdroppers to make absolute breach those bits is very low. Random bits are employed as tool to

pt text message between two parties. Because everything send is being converted to

For instance two parties are taken Alice and bob. When Alice sends a message at random value, and if

card of same random value message is display, otherwise he reads completely wrong. When bob reads the complete photons, shifting takes place

Page 2: 152 End to End Encryption Using QKD Algorithm

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

to transfer data. Sends random basis setting to both parties to fond which is correct. Each value is checked and remaining values are kept for raw key material.

Figure 1: Encryption by Photons Both errors and potential information leakage are removed during subsequent error correction and privacy amplification post-processing steps, leaving Bob and Alice with a shared key known only to them. Eavesdropper (Eve) is one who is trying to acquire data between the transaction, normally called as Eve[3]. Alice have only half set of time to read the data and other half for to access random value. If in case Eve interfere in transaction, shifting process will get discarded thus won’t use that bit for their key. III. PROPOSED WORK Figure 2 indicates how encryption works with QKD. We are using individual photons for transfer of encrypted key data between the person[4].The value of the bit either 1 or 0 is determined by photon itself. At the senders point a photon of series bits generated. The divergence of those photons is calculated at the receiver end. If a third person tries to intercept the data between transmission, the cryptographic file gets destroyed and send back to the sender itself. As we know that QKD works on uncertainty principle of quantum physics which makes impossible for the third person to determine the characteristic of the bit to be transmitted. So it will be impossible for him to send a duplicate file to receiver. If so the receiver end will identify that the number of bits transmitted is varied with the constant one so that receiver will get alert and end the transmission program. To determine the possibility of error we consider the number of bits to the receiver and sender. Comparison process removes the photon which is responsible for creating

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

to transfer data. Sends random basis setting to both parties to fond which is correct. Each value is checked

emaining values are kept for raw key material.

Figure 1: Encryption by Photons

Both errors and potential information leakage are removed during subsequent error correction and

processing steps, leaving ared key known only to them.

Eavesdropper (Eve) is one who is trying to acquire data between the transaction, normally called as Eve[3]. Alice have only half set of time to read the data and other half for to access random value. If in

n transaction, shifting process will get discarded thus won’t use that bit for their key.

Figure 2 indicates how encryption works with QKD. We are using individual photons for transfer of encrypted key data between the person[4].The value f the bit either 1 or 0 is determined by photon itself.

At the senders point a photon of series bits generated. The divergence of those photons is calculated at the receiver end. If a third person tries to intercept the

ographic file gets destroyed and send back to the sender itself. As we know that QKD works on uncertainty principle of quantum physics which makes impossible for the third person to determine the characteristic of the bit

mpossible for him to send a duplicate file to receiver. If so the receiver end will identify that the number of bits transmitted is varied with the constant one so that receiver will get alert and end the transmission program. To determine

of error we consider the number of bits to the receiver and sender. Comparison process removes the photon which is responsible for creating

a private key [5].If session is secure cryptographic will be produced and it will be enabled for transmitting files securely. The generated key is totally secured and cannot be overwritten with high level of security. It has real time application like BB84 protocol and SARG protocol [ A. Encryption Approach Basic approach of encryption is dealed here.know that it involves to blocks, oneraw data to cypertext and to reconvert the cypertext into data [[7]. During this process to receive the data from the receiver a private key is necessary to view the data that is added between the transition. Generally a private key is one whichthe data and also to convert the data. The encryption key is may be identical or there may be simple transform between the conversions. The key developed key is used to maintain the private information. Basic concept of QKD encryption is shown in the figure 2.

Figure 2: Basic Concept of QKD Encryption B. Assigning Information Bit on the Photon

Exchange Key exchange phase is also known as Raw key exchanging which promotes need for key shifting technique in future. First process involves sending secret key for initial authentication. As said protocols like BB84 and SARG will be able to transmit bitvalues across quantum channel for different encoding states. The first process is to apply polarization on photons. If the system is compatible with integer it can be promoted into integer. The first person send a key but its a start for key generation, Itransform form first group of bits to the originally generated and protected key.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 937

5].If session is secure cryptographic will be produced and it will be enabled for transmitting files securely. The generated key is totally secured and cannot be overwritten with high level of security. It has real time application like

protocol [6].

Basic approach of encryption is dealed here. As we blocks, one is to convert the

raw data to cypertext and to reconvert the cypertext [7]. During this process to receive the data

from the receiver a private key is necessary to view the data that is added between the transition. Generally a private key is one which is used to access the data and also to convert the data. The encryption key is may be identical or there may be simple transform between the conversions. The key developed key is used to maintain the private information. Basic concept of QKD encryption is

Figure 2: Basic Concept of QKD Encryption

Assigning Information Bit on the Photon – Key

Key exchange phase is also known as Raw key exchanging which promotes need for key shifting

First process involves sending secret key for initial authentication. As said protocols like BB84 and SARG will be able to transmit bit values across quantum channel for different encoding states. The first process is to apply polarization on photons. If the system is compatible with integer it can be promoted into integer. The first person send a key but its a start for key generation, It will be transform form first group of bits to the originally

Page 3: 152 End to End Encryption Using QKD Algorithm

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

C. Reading Information Bits on the Receiver SideIn next process involved is how actually quantum cryptography is work in real time. While conducting a data with vertical spin , the receiver too get the data with vertical filter. We use beam splitters to demonstrate one to many connection via optical networkkey It is important that receiver should use the correct filter to receive the original data. In this case transmitted data will be accompanied and dumped in phase shift keying or key verification. D. Key Verification – Sifting Key ProcessIt is one of the mode where QKD and protocols like BB84 and SARG are made[8]. In this method the outcome of that photon sent in vertical spin will get as in diagonal spin in receiver end. Key verification plays a dynamic role in this process.BB84 protocol will share the list of filters to the transmitter. Now they interconnect to use changed which filter to use for transition. Figure 3 shows the graph between key and eavesdrop ratio.

Figure 3: QKD Shifting Plot In SARG protocol the receiver now send a list of output which is produced the first person Then need to use that list for sending to reduce the orientation of filter by the receiver. Now the first person opens for deduce the polarization. Sender and receiver discard all the cases then. In this method if we take BB84. It is clear that communication between quantum channel and normal channel is applied by key

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Reading Information Bits on the Receiver Side In next process involved is how actually quantum cryptography is work in real time. While conducting a

vertical spin , the receiver too get the data with vertical filter. We use beam splitters to demonstrate one to many connection via optical networkkey It is important that receiver should use the correct filter to receive the original data. In this case

ansmitted data will be accompanied and dumped in

Sifting Key Process It is one of the mode where QKD and protocols like BB84 and SARG are made[8]. In this method the

in vertical spin will get as in diagonal spin in receiver end. Key verification plays a dynamic role in this process.BB84 protocol will share the list of filters to the transmitter. Now they interconnect to use changed which filter to use

Figure 3 shows the graph between key

Figure 3: QKD Shifting Plot

In SARG protocol the receiver now send a list of output which is produced the first person Then need to use that list for sending to reduce the orientation of

by the receiver. Now the first person opens for deduce the polarization. Sender and receiver discard all the cases then. In this method if we take BB84.

It is clear that communication between quantum channel and normal channel is applied by key

verification. Figure 4 shows the biasing error estimation of signal which is transmitted. After everchanging both ends will have a exact private key.

Figure 4: Biased error estimation IV. CONCLUSION In this paper, we have discussed about possibility and reliability of making QKD encryption in digital communication. It provides advanced data security which puts barrier for data theft between the data transit. As future relays on the hands of quantum computers, Security will be the major threat to those technologies. It is clear that only with the help of Quantum key distribution this shortcoming can be outlined[9]. The proposed idea might have some problems in future but it can be overcome by further study in the encryption. REFERENCE 1. C. H. Bennett, F. Bessette,

J. Smolin, Experimental quantum cryptography, J. Cryptology 5 (1) (1992) 3Brassard, Thedawn of a new era for quantum cryptography: the experimental prototype is working, Sigact News 20 (4) (1989) 78

2. https://readwrite.com/2013/09/19/keysunderstanding-encryption/

3. K. G. Paterson, F. Piper, R. Schack, Why quantum cryptography?, Cryptology ePrint archive: report 2004/156, http://eprint.iacr.org/2004/156.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 938

on. Figure 4 shows the biasing error estimation of signal which is transmitted. After ever changing both ends will have a exact private key.

Figure 4: Biased error estimation

In this paper, we have discussed about possibility and ility of making QKD encryption in digital

communication. It provides advanced data security which puts barrier for data theft between the data transit. As future relays on the hands of quantum computers, Security will be the major threat to those

ies. It is clear that only with the help of Quantum key distribution this shortcoming can be outlined[9]. The proposed idea might have some problems in future but it can be overcome by further

H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, Experimental quantum cryptography, J. Cryptology 5 (1) (1992) 3–28; C. H. Bennett, G. Brassard, Thedawn of a new era for quantum cryptography: the experimental prototype is working, Sigact News 20 (4) (1989) 78–82.

https://readwrite.com/2013/09/19/keys-encryption/

G. Paterson, F. Piper, R. Schack, Why quantum cryptography?, Cryptology ePrint archive: report

rint.iacr.org/2004/156.

Page 4: 152 End to End Encryption Using QKD Algorithm

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

4. https://www.newscientist.com/article/dn4914entangled-photons-secure-money-transfer/

5. https://webcache.googleusercontent.com/search?q=cache:fDYc3NK_5tcJ:https://developer.apple.com/library/archive/documentation/Security/Conceptual/SecTransformPG/SigningandVerifying/SigningandVerifying.html+&cd=2&hl=en&ct=clnk&gl=in

6. https://proandroiddev.com/secure-dataencryption-in-android-part-2-991a89e55a23?gi=8a37df1c4f33

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

https://www.newscientist.com/article/dn4914-transfer/

https://webcache.googleusercontent.com/search?q3NK_5tcJ:https://developer.apple.co

m/library/archive/documentation/Security/Conceptual/SecTransformPG/SigningandVerifying/SigningandVerifying.html+&cd=2&hl=en&ct=clnk&gl=

data-in-android-

7. https://github.com/facebook/draftjs/blob/master/docs/APIReferenceConversion.md

8. https://en.wikipedia.org/wiki/BB84

9. P. D. Townsend, S. J. D. Phoenix, K.M. Barnett, Quantum cryptography for multipassive optical networks, E1875–1877

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 939

hub.com/facebook/draft-js/blob/master/docs/APIReference-Data-

https://en.wikipedia.org/wiki/BB84

D. Phoenix, K. J. Blow, S. M. Barnett, Quantum cryptography for multi-user passive optical networks, Electron. Lett. 30 (1994)