Digital Data Security by using Quantum Cryptography

Abstract

Security is the most common aspect of today' world, when all things are going to digitize then make them secure over the communication channel has become the prime aim of the digital service providers. Although many encryption and decryption techniques are available in the field of the cryptography, but they all are based on mathematical calculation which are difficult to solve but not impossible. The all existing techniques can be break by using quantum computer and some extra efforts. But Quantum Cryptography that is free from the mathematical calculations and large prime number factorization is solution of this type of problems. Quantum Cryptography based on the laws of physics and quantum mechanics which gives the most secure way of encryption and decryption. In this paper Key Generation and Exchanging of Key is implemented by using Visual Basic software to secure the digital data over the communication channel. Quantum cryptography will use Photons to transmit the information over the channel which are polarized at different orientation which are 00,450,900 and 1350 from sender at some basis and these polarized information is received by second party at other end and receiver will match the received photon with his photon on his basis and matched photons will form the Key, and if anyone try to hack that information both parties will come to know about the hacking. Mohd. Amjad | Raju"Digital Data Security by using Quantum Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15900.pdf http://www.ijtsrd.com/engineering/computer-engineering/15900/digital-data-security-by-using-quantum-cryptography/mohd-amjad

Authors and Affiliations

Keywords

Related Articles

A Heart Disease Prediction Model using Logistic Regression By Cleveland DataBase

The early prognosis of cardiovascular diseases can aid in making decisions to lifestyle changes in high risk patients and in turn reduce their complications. Research has attempted to pinpoint the most influential factor...

Analysis of Multi Storey Building using Structural Software MIDAS General

Earthquakes are known to produce one of the most destructive forces on earth. It has been seen that during past earthquakes many of the buildings were collapsed. Therefore, realistic method for analysis and design are re...

Algebra in Real Life

is used. Mathematics is applied in day to day life, so we can now review the concepts of Algebra and its uses in daily life. Here in our work we have made a small split up of items in a bag while shopping. Basic Algebra...

Speed Control System for BLDC Motor by using Direct Back EMF Detection Mathod

BLDC motors are used in many industrial and traction applications due to high efficiency, low maintenance and high torque. For good performance of BLDC motors, the accurate knowledge of the rotor position is required. Th...

Solitary Simple Renal Cyst: A Case Report

Solitary simple renal cyst is a cystic disease of kidney, incidentally found during routine abdominal imaging, dissection and autopsy without clinical significance. The prevalence of solitary renal cyst is increasing pro...

Download PDF file
  • EP ID EP389238
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

(2018). Digital Data Security by using Quantum Cryptography. International Journal of Trend in Scientific Research and Development, 2(5), 482-489. https://europub.co.uk./articles/-A-389238