IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Contact Us
CONTACT

IJSTR >> Volume 8 - Issue 8, August 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



AN APPROACH FOR IoT SECURITY USING QUANTUM KEY DISTRIBUTION

[Full Text]

 

AUTHOR(S)

A. Beatrice Dorothy, S. Britto Ramesh Kumar

 

KEYWORDS

Quantum Channel, BB84 protocol, RSA, Modified RSA, Quantum Key Distribution.

 

ABSTRACT

Quantum cryptography is a way to deal with cryptography dependent on the laws of quantum mechanics. Cryptography depends on key sharing which plays a vital role. For providing a provable security during key distribution, quantum cryptography is used. There are many secure protocols and algorithms were proposed already in quantum cryptography. The Quantum Key Distribution faces several security issues, one among them, is Eavesdropper during the communication. It is an important issue which leads to thrashing of security by Man-in-the-middle (MITM) attack. In this paper, to detect eavesdropping and to enhance security during encryption, a Modified RSA method for encryption is proposed. The BB84 protocol for private key generation and distribution through quantum channel is used. Therefore, the proposed technique provides secure quantum key generation and distribution by which it prevents Eavesdropping security threat.

 

REFERENCES

[1] https://en.wikipedia.org/wiki/Quantum_cryptography.
[2] https://en.wikipedia.org/wiki/Quantum_key_distribution.
[3] Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi, “Improving TLS Security by Quantum Cryptography”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, 2010.
[4] David Gaharia and Joel Wibron, “Detection of Eavesdropping in Quantum Key Distribution using Bell's Theorem and Error Rate Calculations”, Research Academy for Young Scientists, 2011.
[5] Neha Chhabra, “Secret Key Generation and Eavesdropping detection using Quantum Cryptography”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 3, 2012.
[6] Abhishek Agnihotri, “The Next Level of Information Security-Impact of Quantum Cryptography”, International Journal of Engineering Science Advance Research, Vol. 2, 2016.
[7] Vivek Singh and Bhawna Chauhan, “Survey on Various Quantum Key Distribution Algorithms”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 6, 2015.
[8] Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, “Quantum Key Distribution by Using Public Key Algorithm (RSA)”, IEEE, 2013.
[9] Rajni Goel, Moses Garuba, Anteneh Girma, “Research Directions in Quantum Cryptography”, International Conference on Information Technology (ITNG'07), 2007.
[10] N.Sasirekha, M.Hemalatha, “Quantum Cryptography using Quantum Key Distribution and its Applications”, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 3, 2014.
[11] Aparna Singh, “Centralized Key Distribution using Quantum Cryptography”, International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 6, 2017.
[12] Luis Adrian Lizama-Pérez, José Mauricio López and Eduardo De Carlos López, “Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack”, Entropy, Vol. 19, 2017.
[13] Hitesh Singh, D.L. Gupta, A.K Singh, “Quantum Key Distribution Protocols-A Review”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 16, 2014.
[14] D N Kartheek, M Abhilash Kumar, M R Pavan Kumar, “Security using Quantum Key Distribution Protocols (QKDPs)”, International Journal of Scientific & Engineering Research(IJSER), Vol. 3, 2012.
[15] Charles H. Bennett, Gilles Brassard, “Quantum cryptography-Public key distribution and coin tossing”, Theoretical Computer Science, Vol. 7, 2014.
[16] Beatrice A. Dorothy and Britto S. Ramesh Kumar, “DORBRI: An Architecture for the DoD Security Breaches Through Quantum IoT”, Lecture Notes on Data Engineering and Communications Technologies (Springer), Vol.15, 2018.