Skip to main content
Log in

Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security mechanisms. The essential function of transmitting and sharing a secret key between two entities is the safe key management technique, which is the most important components to be concerned about when incorporating cryptographic activities into any system. If the key management procedures are ineffective, the system will be vulnerable to vulnerabilities and potentially lethal outsider attacks. Quantum cryptography is a method of securely encrypting information sent between parties while also detecting intruders attempting to listen in on the discussion. Quantum cryptography holds promise as a solution to these and other issues. In this paper,we discuss the Quantum key distribution (BB84 protocol) and how when integrated with conventional cryptography algorithms it increases security in data transmission to a remarkably high level. We also compare the cryptography algorithms for different file sizes and measure their performance by calculating the Encryption,decryption,throughput and Avalanche effect of the algorithms with and without QKD. The elapsed time of the conventional algorithm with QKD achieve 56.8%, 58.6% and 54.3% less time than AES, 3DES and Blowfish respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig.10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Paterson, K. G., Piper, F., & Schack, R. (2004). Why quantum cryptography? (No. quant-ph/0406147).

  2. Portmann, C., & Renner, R. (2022). Security in quantum cryptography. Reviews of Modern Physics, 94(2), 025008.

    Article  MathSciNet  Google Scholar 

  3. Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1–11.

    Google Scholar 

  4. Rao, S. (2015). Performance analysis of DES and triple DES. International Journal of Computer Applications, 130(14), 30–24.

    Article  Google Scholar 

  5. Alabaichi, A., Ahmad, F. & Mahmod, R. (2013). Security analysis of blowfish algorithm. In 2013 second international conference on informatics and applications (ICIA). pp. 12–18. IEEE.

  6. Chakrabarti, S., & Babu, G.S. (2020). Quantum key distribution: A safer alternate to asymmetric key exchange policies. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), 3910–3915.

  7. Aumasson, J. P. (2017). The impact of quantum computing on cryptography. Computer Fraud and Security, 2017(6), 8–11.

    Article  Google Scholar 

  8. Bruss, D., Erdélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum cryptography: A survey. ACM Computing Surveys (CSUR), 39(2), 6-es. https://doi.org/10.1145/1242471.1242474

    Article  Google Scholar 

  9. da Silva, T. F., Xavier, G. B., Temporão, G. P., & von der Weid, J. P. (2012). Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Optics express, 20(17), 18911–18924.

    Article  Google Scholar 

  10. Li, D., Huang, P., Zhou, Y., Li, Y., & Zeng, G. (2018). Memory-saving implementation of high-speed privacy amplification algorithm for continuous-variable quantum key distribution. IEEE Photonics Journal, 10(5), 1–12.

    Article  Google Scholar 

  11. Bhandari, R. (2014). Quantum error correcting codes and the security proof of the bb84 protocol. arXiv preprint arXiv:1409.1452.

  12. Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), 025002.

    Article  MathSciNet  Google Scholar 

  13. Elliott, C., Pearson, D., & Troxel, G. (2003). Quantum cryptography in practice. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. pp. 227–238, https://doi.org/10.1145/863955.863982.

  14. Teja, V., Banerjee, P., Sharma, N.N., & Mittal, R.K. (2007). Quantum cryptography: state-of-art, challenges and future perspectives. In 2007 7th IEEE conference on nanotechnology (IEEE NANO). pp. 1296–1301. IEEE, https://doi.org/10.1109/NANO.2007.4601420.

  15. Moizuddin, M., Winston, J., & Qayyum, M. (2017). A comprehensive survey: quantum cryptography. In 2017 2nd international conference on anti-cyber crimes (ICACC). pp. 98–102. IEEE, https://doi.org/10.1109/Anti-Cybercrime.2017.7905271.

  16. Kute, S. S., & Desai, C. G. (2017). Quantum cryptography: A review. Indian Journal of Science and Technology, 10(3), 1–5.

    Article  Google Scholar 

  17. Qi, B., Qian, L., & Lo, H.K. (2010). A brief introduction of quantum cryptography for engineers. arXiv preprint arXiv:1002.1237.

  18. Lakshmi, P.S., & Murali, G. (2017). Comparison of classical and quantum cryptography using QKD simulator. In 2017 International conference on energy, communication, data analytics and soft computing (ICECDS). pp. 3543–3547. IEEE.

  19. Krämer, J. (2019). Post-quantum cryptography and its application to the IoT. Informatik Spektrum, 42(5), 343–344.

    Article  Google Scholar 

  20. Semmouni, M.C., Nitaj, A., & Belkasmi, M. (2019). Bitcoin security with post quantum cryptography. In International conference on networked systems. pp. 281–288. Springer, Cham.

  21. Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J. L., & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.

    Article  Google Scholar 

  22. Sharma, G. and Kalra, S. (2016). A novel scheme for data security in cloud computing using quantum cryptography. In Proceedings of the international conference on advances in information communication technology and computing pp. 1–6.

  23. Zhou, T., Shen, J., Li, X., Wang, C., & Shen, J. (2018). Quantum cryptography for the future internet and the security analysis. Security and Communication Networks2018, 1–7.

  24. Borges, F., Reis, P. R., & Pereira, D. (2020). A comparison of security and its performance for key agreements in post-quantum cryptography. IEEE Access, 8, 142413–142422.

    Article  Google Scholar 

  25. Babber, K. and Singh, J.P., (2021). Quantum cryptography and security analysis. Journal of Discrete Mathematical Sciences and Cryptography, pp. 1–12.

  26. Jassem, Y.H., & Abdullah, A.A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International11(3), 279–288.

  27. Marco, L., Andrew, S., Romain, A., Christopher, C., Degiovanni, I. P., Gramegna, M., … & Zhiliang, Y. (2018). Implementation Security of Quantum Cryptography-Introduction, challenges, solutions ETSI White Paper No. 27.

  28. Thayananthan, V., & Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, 149–156.

    Article  Google Scholar 

  29. Bhatt, A. P., & Sharma, A. (2019). Quantum cryptography for internet of things security. Journal of Electronic Science and Technology, 17(3), 213–220.

    Google Scholar 

  30. Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications Magazine, 55(2), 116–120.

    Article  Google Scholar 

  31. Gabriel, A. J., Alese, B. K., Adetunmbi, A. O., & Adewale, O. S. (2015). Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST), 4(1), 351–357.

    Article  Google Scholar 

  32. Qiu, L., Sun, X., & Xu, J. (2018). Categorical quantum cryptography for access control in cloud computing. Soft computing, 22(19), 6363–6370.

    Article  MATH  Google Scholar 

  33. Verma, P., & Lohiya, R. (2015). A comprehensive survey on: Quantum cryptography. International Journal of Science and Research, 4(4), 2214–2219.

    Google Scholar 

  34. Dasari, V.R., Sadlier, R.J., Geerhart III, B.E. and Humble, T.S. (2018). Demonstration of provably secure quantum key distribution (QKD). In Disruptive technologies in information sciences, vol. 10652, pp. 65–71. SPIE.

  35. Murugan, G. (2020). An efficient algorithm on quantum computing with quantum key distribution for secure communication. International Journal of Communications5, 12–23.

  36. Shi, R. H., Liu, B., & Zhang, M. (2021). Verifiable quantum key exchange with authentication. International Journal of Theoretical Physics, 60(1), 227–242.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

The author with a deep sense of gratitude would thank the supervisor for his guidance and constant support rendered during this research.

Funding

No Financial support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Ahilan.

Ethics declarations

Conflict of interest

This paper has no conflict of interest for publishing.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahilan, A., Jeyam, A. Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution. Wireless Pers Commun 129, 549–567 (2023). https://doi.org/10.1007/s11277-022-10110-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10110-8

Keywords

Navigation