Title: Generating near-ideal nonces for cryptographic processes using Quantum Cryptography
Abstract:Quantum cryptography and quantum computing explore the physics and principles of randomness achieved through quantum mechanics. The aim of quantum cryptography is to transfer data from the sender to t...Quantum cryptography and quantum computing explore the physics and principles of randomness achieved through quantum mechanics. The aim of quantum cryptography is to transfer data from the sender to the receiver without any information loss, error, or violation of the needed security aspects. Ideally, the data should be transferred with basic standards like Confidentiality, Integrity, and Availability (CIA). Also, other services like authentication, authorization, access control, digital signatures, etc. need to be implemented depending on the requirement of the application. For all these services, random numbers are required to be used as nonces, session keys, identifiers, initialization vectors, seed values, etc. This work primarily focuses on generating random numbers using the Quantum Key Distribution (QKD) as a parallel benefit. BB84 and Six State Protocol (SSP) are the protocols used in Quantum Key Distribution (QKD). In this work, these protocols are simulated. The security levels of these protocols are analyzed based on the parameters like randomization and probability. The protocols are implemented in Qiskit software. Filter arrangement plays an important role in Quantum Cryptography. This offers an additional axis compared to the BB84 protocol. The approach thereby improves the randomization in SSP protocol. The comparison of both protocols shows that the SSP protocol gives better randomization when compared to the BB84 protocol.Read More
Publication Year: 2023
Publication Date: 2023-03-24
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 1
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot