Please use this identifier to cite or link to this item:
|Title:||An efficient quantum cryptography’s algorithm for data security|
|Abstract:||Present paper provides a conceptual framework on the proposed C-QUBITS Key exchange algorithm, which is used as a base for the data security through quantum computing. In the first phase a detailed description of the BB84 Cryptographic protocol is given, from which the first algorithm based on the quantum cryptography has been derived. In this the emphasis is on the loopholes present in this algorithm which makes it less effective. In the next phase the focus is made on the C-QUBITS algorithm, which can be used for the exchange of key between the sender and the receiver. Thereafter, the key is used for the encryption of the data to be transferred between the two entities. This algorithm makes use of the concepts of quantum physics like polarization and more importantly C-NOT gate which is mainly used in case of qubits (quantum bits). Complete experimental set-up of the whole process involved in the algorithm has been presented and all possible cases have been discussed. Mathematical solution is derived which proves that data security through C-QUBITS algorithm is more effective and secure than other algorithms based on quantum approach.|
|Appears in Collections:||IJEMS Vol.14(5) [October 2007]|
Files in This Item:
|IJEMS 14(5) (2007) 346-351.pdf||348.59 kB||Adobe PDF||View/Open|
Items in NOPR are protected by copyright, with all rights reserved, unless otherwise indicated.