Skip to main content
Top
Published in: Wireless Personal Communications 1/2023

15-11-2022

Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution

Published in: Wireless Personal Communications | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security mechanisms. The essential function of transmitting and sharing a secret key between two entities is the safe key management technique, which is the most important components to be concerned about when incorporating cryptographic activities into any system. If the key management procedures are ineffective, the system will be vulnerable to vulnerabilities and potentially lethal outsider attacks. Quantum cryptography is a method of securely encrypting information sent between parties while also detecting intruders attempting to listen in on the discussion. Quantum cryptography holds promise as a solution to these and other issues. In this paper,we discuss the Quantum key distribution (BB84 protocol) and how when integrated with conventional cryptography algorithms it increases security in data transmission to a remarkably high level. We also compare the cryptography algorithms for different file sizes and measure their performance by calculating the Encryption,decryption,throughput and Avalanche effect of the algorithms with and without QKD. The elapsed time of the conventional algorithm with QKD achieve 56.8%, 58.6% and 54.3% less time than AES, 3DES and Blowfish respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Paterson, K. G., Piper, F., & Schack, R. (2004). Why quantum cryptography? (No. quant-ph/0406147). Paterson, K. G., Piper, F., & Schack, R. (2004). Why quantum cryptography? (No. quant-ph/0406147).
2.
3.
go back to reference Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1–11. Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1–11.
4.
go back to reference Rao, S. (2015). Performance analysis of DES and triple DES. International Journal of Computer Applications, 130(14), 30–24.CrossRef Rao, S. (2015). Performance analysis of DES and triple DES. International Journal of Computer Applications, 130(14), 30–24.CrossRef
5.
go back to reference Alabaichi, A., Ahmad, F. & Mahmod, R. (2013). Security analysis of blowfish algorithm. In 2013 second international conference on informatics and applications (ICIA). pp. 12–18. IEEE. Alabaichi, A., Ahmad, F. & Mahmod, R. (2013). Security analysis of blowfish algorithm. In 2013 second international conference on informatics and applications (ICIA). pp. 12–18. IEEE.
6.
go back to reference Chakrabarti, S., & Babu, G.S. (2020). Quantum key distribution: A safer alternate to asymmetric key exchange policies. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), 3910–3915. Chakrabarti, S., & Babu, G.S. (2020). Quantum key distribution: A safer alternate to asymmetric key exchange policies. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), 3910–3915.
7.
go back to reference Aumasson, J. P. (2017). The impact of quantum computing on cryptography. Computer Fraud and Security, 2017(6), 8–11.CrossRef Aumasson, J. P. (2017). The impact of quantum computing on cryptography. Computer Fraud and Security, 2017(6), 8–11.CrossRef
9.
go back to reference da Silva, T. F., Xavier, G. B., Temporão, G. P., & von der Weid, J. P. (2012). Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Optics express, 20(17), 18911–18924.CrossRef da Silva, T. F., Xavier, G. B., Temporão, G. P., & von der Weid, J. P. (2012). Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Optics express, 20(17), 18911–18924.CrossRef
10.
go back to reference Li, D., Huang, P., Zhou, Y., Li, Y., & Zeng, G. (2018). Memory-saving implementation of high-speed privacy amplification algorithm for continuous-variable quantum key distribution. IEEE Photonics Journal, 10(5), 1–12.CrossRef Li, D., Huang, P., Zhou, Y., Li, Y., & Zeng, G. (2018). Memory-saving implementation of high-speed privacy amplification algorithm for continuous-variable quantum key distribution. IEEE Photonics Journal, 10(5), 1–12.CrossRef
11.
go back to reference Bhandari, R. (2014). Quantum error correcting codes and the security proof of the bb84 protocol. arXiv preprint arXiv:1409.1452. Bhandari, R. (2014). Quantum error correcting codes and the security proof of the bb84 protocol. arXiv preprint arXiv:​1409.​1452.
12.
go back to reference Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), 025002.MathSciNetCrossRef Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), 025002.MathSciNetCrossRef
13.
go back to reference Elliott, C., Pearson, D., & Troxel, G. (2003). Quantum cryptography in practice. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. pp. 227–238, https://doi.org/10.1145/863955.863982. Elliott, C., Pearson, D., & Troxel, G. (2003). Quantum cryptography in practice. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. pp. 227–238, https://​doi.​org/​10.​1145/​863955.​863982.
16.
go back to reference Kute, S. S., & Desai, C. G. (2017). Quantum cryptography: A review. Indian Journal of Science and Technology, 10(3), 1–5.CrossRef Kute, S. S., & Desai, C. G. (2017). Quantum cryptography: A review. Indian Journal of Science and Technology, 10(3), 1–5.CrossRef
17.
go back to reference Qi, B., Qian, L., & Lo, H.K. (2010). A brief introduction of quantum cryptography for engineers. arXiv preprint arXiv:1002.1237. Qi, B., Qian, L., & Lo, H.K. (2010). A brief introduction of quantum cryptography for engineers. arXiv preprint arXiv:​1002.​1237.
18.
go back to reference Lakshmi, P.S., & Murali, G. (2017). Comparison of classical and quantum cryptography using QKD simulator. In 2017 International conference on energy, communication, data analytics and soft computing (ICECDS). pp. 3543–3547. IEEE. Lakshmi, P.S., & Murali, G. (2017). Comparison of classical and quantum cryptography using QKD simulator. In 2017 International conference on energy, communication, data analytics and soft computing (ICECDS). pp. 3543–3547. IEEE.
19.
go back to reference Krämer, J. (2019). Post-quantum cryptography and its application to the IoT. Informatik Spektrum, 42(5), 343–344.CrossRef Krämer, J. (2019). Post-quantum cryptography and its application to the IoT. Informatik Spektrum, 42(5), 343–344.CrossRef
20.
go back to reference Semmouni, M.C., Nitaj, A., & Belkasmi, M. (2019). Bitcoin security with post quantum cryptography. In International conference on networked systems. pp. 281–288. Springer, Cham. Semmouni, M.C., Nitaj, A., & Belkasmi, M. (2019). Bitcoin security with post quantum cryptography. In International conference on networked systems. pp. 281–288. Springer, Cham.
21.
go back to reference Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J. L., & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.CrossRef Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J. L., & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.CrossRef
22.
go back to reference Sharma, G. and Kalra, S. (2016). A novel scheme for data security in cloud computing using quantum cryptography. In Proceedings of the international conference on advances in information communication technology and computing pp. 1–6. Sharma, G. and Kalra, S. (2016). A novel scheme for data security in cloud computing using quantum cryptography. In Proceedings of the international conference on advances in information communication technology and computing pp. 1–6.
23.
go back to reference Zhou, T., Shen, J., Li, X., Wang, C., & Shen, J. (2018). Quantum cryptography for the future internet and the security analysis. Security and Communication Networks, 2018, 1–7. Zhou, T., Shen, J., Li, X., Wang, C., & Shen, J. (2018). Quantum cryptography for the future internet and the security analysis. Security and Communication Networks2018, 1–7.
24.
go back to reference Borges, F., Reis, P. R., & Pereira, D. (2020). A comparison of security and its performance for key agreements in post-quantum cryptography. IEEE Access, 8, 142413–142422.CrossRef Borges, F., Reis, P. R., & Pereira, D. (2020). A comparison of security and its performance for key agreements in post-quantum cryptography. IEEE Access, 8, 142413–142422.CrossRef
25.
go back to reference Babber, K. and Singh, J.P., (2021). Quantum cryptography and security analysis. Journal of Discrete Mathematical Sciences and Cryptography, pp. 1–12. Babber, K. and Singh, J.P., (2021). Quantum cryptography and security analysis. Journal of Discrete Mathematical Sciences and Cryptography, pp. 1–12.
26.
go back to reference Jassem, Y.H., & Abdullah, A.A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International, 11(3), 279–288. Jassem, Y.H., & Abdullah, A.A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International11(3), 279–288.
27.
go back to reference Marco, L., Andrew, S., Romain, A., Christopher, C., Degiovanni, I. P., Gramegna, M., … & Zhiliang, Y. (2018). Implementation Security of Quantum Cryptography-Introduction, challenges, solutions ETSI White Paper No. 27. Marco, L., Andrew, S., Romain, A., Christopher, C., Degiovanni, I. P., Gramegna, M., … & Zhiliang, Y. (2018). Implementation Security of Quantum Cryptography-Introduction, challenges, solutions ETSI White Paper No. 27.
28.
go back to reference Thayananthan, V., & Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, 149–156.CrossRef Thayananthan, V., & Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, 149–156.CrossRef
29.
go back to reference Bhatt, A. P., & Sharma, A. (2019). Quantum cryptography for internet of things security. Journal of Electronic Science and Technology, 17(3), 213–220. Bhatt, A. P., & Sharma, A. (2019). Quantum cryptography for internet of things security. Journal of Electronic Science and Technology, 17(3), 213–220.
30.
go back to reference Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications Magazine, 55(2), 116–120.CrossRef Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications Magazine, 55(2), 116–120.CrossRef
31.
go back to reference Gabriel, A. J., Alese, B. K., Adetunmbi, A. O., & Adewale, O. S. (2015). Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST), 4(1), 351–357.CrossRef Gabriel, A. J., Alese, B. K., Adetunmbi, A. O., & Adewale, O. S. (2015). Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST), 4(1), 351–357.CrossRef
32.
go back to reference Qiu, L., Sun, X., & Xu, J. (2018). Categorical quantum cryptography for access control in cloud computing. Soft computing, 22(19), 6363–6370.CrossRefMATH Qiu, L., Sun, X., & Xu, J. (2018). Categorical quantum cryptography for access control in cloud computing. Soft computing, 22(19), 6363–6370.CrossRefMATH
33.
go back to reference Verma, P., & Lohiya, R. (2015). A comprehensive survey on: Quantum cryptography. International Journal of Science and Research, 4(4), 2214–2219. Verma, P., & Lohiya, R. (2015). A comprehensive survey on: Quantum cryptography. International Journal of Science and Research, 4(4), 2214–2219.
34.
go back to reference Dasari, V.R., Sadlier, R.J., Geerhart III, B.E. and Humble, T.S. (2018). Demonstration of provably secure quantum key distribution (QKD). In Disruptive technologies in information sciences, vol. 10652, pp. 65–71. SPIE. Dasari, V.R., Sadlier, R.J., Geerhart III, B.E. and Humble, T.S. (2018). Demonstration of provably secure quantum key distribution (QKD). In Disruptive technologies in information sciences, vol. 10652, pp. 65–71. SPIE.
35.
go back to reference Murugan, G. (2020). An efficient algorithm on quantum computing with quantum key distribution for secure communication. International Journal of Communications, 5, 12–23. Murugan, G. (2020). An efficient algorithm on quantum computing with quantum key distribution for secure communication. International Journal of Communications5, 12–23.
36.
go back to reference Shi, R. H., Liu, B., & Zhang, M. (2021). Verifiable quantum key exchange with authentication. International Journal of Theoretical Physics, 60(1), 227–242.MathSciNetCrossRefMATH Shi, R. H., Liu, B., & Zhang, M. (2021). Verifiable quantum key exchange with authentication. International Journal of Theoretical Physics, 60(1), 227–242.MathSciNetCrossRefMATH
Metadata
Title
Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution
Publication date
15-11-2022
Published in
Wireless Personal Communications / Issue 1/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10110-8

Other articles of this Issue 1/2023

Wireless Personal Communications 1/2023 Go to the issue