DocumentCode :
652360
Title :
An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol
Author :
El Rifai, Mayssaa ; Verma, Pawan Kumar
Author_Institution :
Telecommun. Eng. Program, Univ. of Oklahoma Tulsa, Tulsa, OK, USA
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
1803
Lastpage :
1807
Abstract :
A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper, we present a powerful algorithm to further enhance the security of the three-stage protocol. Using this algorithm, the three-stage protocol will be provided with yet another layer of security by provisioning an initialization vector between the two communicating parties. The addition of this contrivance makes it theoretically impossible for any intruder to recover the plaintext except under the condition when the intruder has simultaneous real-time access to four elements in the implementation of the protocol. In this paper, it is postulated that the concept can be extended to an electronic implementation with minor enhancement.
Keywords :
cryptographic protocols; private key cryptography; quantum cryptography; communicating parties; contrivance; initialization vector provisioning; multiphoton tolerant protocol; plaintext recover; real-time access; security layer; three-stage quantum cryptography protocol security; Cryptography; Equations; Optics; Photonics; Protocols; Vectors; Initialization Vector; Multi - photon tolerant protocol; Polarization; Rotation transformation; Three - stage protocol;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.224
Filename :
6681055
Link To Document :
بازگشت