Skip to main content

Modeling and Simulation of Secure Data Transfer in High Level Language Using Quantum Communication Protocol

  • Conference paper
  • First Online:
  • 635 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 870))

Abstract

Secure data transfer is the main important task in the data transfer between the two or multiple nodes in the network. There are very large number of protocols and security mechanisms available. These security mechanisms can be broken by using the very high computing power processors. Quantum cryptography can be the promising secure communication using quantum physical laws. Quantum communication itself makes the communication more promising and reliable in terms of security. Many quantum cryptography protocols are proposed till date for secure communication including a popular “three-stage quantum cryptography protocol” (Kak in Phys Lett 293–296, 2006 [1]). In the current quantum cryptography protocols, the unit of data is a binary bit. Here, the proposed communication system is capable of transferring the data in the form of character rather than the bit-by-bit data transfer. This methodology uses the simple logic, i.e., the high level language is used for the data transfer. The main problem of secure key exchange is solved. The angle of rotation of the photon beam is being shared securely. Here, a secure multistage quantum communication protocol is implemented. This proposed protocol has minimized the network traffic drastically. The number of signals required for the transfer of the character is decreased six times of the previous one.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. S. Kak, A three-stage quantum cryptography protocol. Found. Phys. Lett. 293–296 (2006), http://arxiv.org/abs/quant-ph/0503027. Accessed 20 Nov 2016

    Article  MathSciNet  Google Scholar 

  2. W.P. Eleanor, G. Rieffel, An introduction to quantum computing for non-physicists. ACM Comput. Surv. 32(3), 300–335, http://doi.acm.org/10.1145/367701.367709. Accessed 19 Nov 2016

  3. P. Basuchowdhuri, Comparing BB84 and Authentication-Aided kak’s Three-Stage Quantum Protocol (2007), CoRR http://arxiv.org/abs/cs/0703092. Accessed 10 Nov 2016

  4. S. Mandal, G. Macdonald, M.E. Rifai, N. Punekar, F. Zamani, Y. Chen, S. Kak, P.K. Verma, R.C. Huck, J. Sluss, Implementation of Secure Quantum Protocol using Multiple Photons for Communication (2012). CoRR http://arxiv.org/abs/1208.6198. Accessed 20 Nov 2016

  5. Y. Chen, S. Kak, P.K. Verma, G. Macdonald, M.E. Rifai, N. Punekar, Multi-photon tolerant secure quantum communication—From theory to practice, in IEEE ‘ICC’ (2013), pp. 2111–2116

    Google Scholar 

  6. S. Mandal, G. Macdonald, M. El Rifai, N. Punekar, F. Zamani, C. Yuhua, S. Kak, P.K. Verma, R.C. Huck, J. Sluss, Multi-photon implementation of three-stage quantum cryptography protocol. in IEEE 2013 International Conference—Bangkok Information Networking (ICOIN) (2013), pp. 6–11

    Google Scholar 

  7. C.H. Bennett, G. Brassard, Quantum cryptography: Public key distribution and coin tossing, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing (IEEE Press, India 1984), pp. 175–179

    Google Scholar 

  8. S. Kak, Threshold Quantum Cryptography (2013). CoRR http://arxiv.org/pdf/1310.6333. Accessed 20 Nov 2016

  9. J.H. Thomas, Variations on kak’s Three Stage Quantum Cryptography Protocol (2007). CoRR http://arxiv.org/abs/0706.2888. Accessed 12 Nov 2016

  10. V. Scarani, C. Kurtsiefer, The Black Paper of Quantum Cryptography: Real Implementation Problems (2012), http://arxiv.org/abs/0906.4547v2. Accessed 15 Nov 2016

  11. S. Kak, Y. Chen, P.K. Verma, iAQC: The Intensity-Aware Quantum Cryptography Protocol (2012). CoRR http://dblp.uni-trier.de/db/journals/corr/corr1206.html#abs-1206-6778. Accessed 20 Nov 2016

  12. S. Chitikela, Intensity and State Estimation in Quantum Cryptography (2013) CoRR http://arxiv.org/abs/1302.1823. Accessed 14 Nov 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj E. Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, M.E., Hussain, M., Sharma, S. (2019). Modeling and Simulation of Secure Data Transfer in High Level Language Using Quantum Communication Protocol. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2673-8_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2672-1

  • Online ISBN: 978-981-13-2673-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics