Abstract
Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security mechanisms. The essential function of transmitting and sharing a secret key between two entities is the safe key management technique, which is the most important components to be concerned about when incorporating cryptographic activities into any system. If the key management procedures are ineffective, the system will be vulnerable to vulnerabilities and potentially lethal outsider attacks. Quantum cryptography is a method of securely encrypting information sent between parties while also detecting intruders attempting to listen in on the discussion. Quantum cryptography holds promise as a solution to these and other issues. In this paper,we discuss the Quantum key distribution (BB84 protocol) and how when integrated with conventional cryptography algorithms it increases security in data transmission to a remarkably high level. We also compare the cryptography algorithms for different file sizes and measure their performance by calculating the Encryption,decryption,throughput and Avalanche effect of the algorithms with and without QKD. The elapsed time of the conventional algorithm with QKD achieve 56.8%, 58.6% and 54.3% less time than AES, 3DES and Blowfish respectively.
Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Paterson, K. G., Piper, F., & Schack, R. (2004). Why quantum cryptography? (No. quant-ph/0406147).
Portmann, C., & Renner, R. (2022). Security in quantum cryptography. Reviews of Modern Physics, 94(2), 025008.
Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1–11.
Rao, S. (2015). Performance analysis of DES and triple DES. International Journal of Computer Applications, 130(14), 30–24.
Alabaichi, A., Ahmad, F. & Mahmod, R. (2013). Security analysis of blowfish algorithm. In 2013 second international conference on informatics and applications (ICIA). pp. 12–18. IEEE.
Chakrabarti, S., & Babu, G.S. (2020). Quantum key distribution: A safer alternate to asymmetric key exchange policies. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), 3910–3915.
Aumasson, J. P. (2017). The impact of quantum computing on cryptography. Computer Fraud and Security, 2017(6), 8–11.
Bruss, D., Erdélyi, G., Meyer, T., Riege, T., & Rothe, J. (2007). Quantum cryptography: A survey. ACM Computing Surveys (CSUR), 39(2), 6-es. https://doi.org/10.1145/1242471.1242474
da Silva, T. F., Xavier, G. B., Temporão, G. P., & von der Weid, J. P. (2012). Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Optics express, 20(17), 18911–18924.
Li, D., Huang, P., Zhou, Y., Li, Y., & Zeng, G. (2018). Memory-saving implementation of high-speed privacy amplification algorithm for continuous-variable quantum key distribution. IEEE Photonics Journal, 10(5), 1–12.
Bhandari, R. (2014). Quantum error correcting codes and the security proof of the bb84 protocol. arXiv preprint arXiv:1409.1452.
Xu, F., Ma, X., Zhang, Q., Lo, H. K., & Pan, J. W. (2020). Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 92(2), 025002.
Elliott, C., Pearson, D., & Troxel, G. (2003). Quantum cryptography in practice. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. pp. 227–238, https://doi.org/10.1145/863955.863982.
Teja, V., Banerjee, P., Sharma, N.N., & Mittal, R.K. (2007). Quantum cryptography: state-of-art, challenges and future perspectives. In 2007 7th IEEE conference on nanotechnology (IEEE NANO). pp. 1296–1301. IEEE, https://doi.org/10.1109/NANO.2007.4601420.
Moizuddin, M., Winston, J., & Qayyum, M. (2017). A comprehensive survey: quantum cryptography. In 2017 2nd international conference on anti-cyber crimes (ICACC). pp. 98–102. IEEE, https://doi.org/10.1109/Anti-Cybercrime.2017.7905271.
Kute, S. S., & Desai, C. G. (2017). Quantum cryptography: A review. Indian Journal of Science and Technology, 10(3), 1–5.
Qi, B., Qian, L., & Lo, H.K. (2010). A brief introduction of quantum cryptography for engineers. arXiv preprint arXiv:1002.1237.
Lakshmi, P.S., & Murali, G. (2017). Comparison of classical and quantum cryptography using QKD simulator. In 2017 International conference on energy, communication, data analytics and soft computing (ICECDS). pp. 3543–3547. IEEE.
Krämer, J. (2019). Post-quantum cryptography and its application to the IoT. Informatik Spektrum, 42(5), 343–344.
Semmouni, M.C., Nitaj, A., & Belkasmi, M. (2019). Bitcoin security with post quantum cryptography. In International conference on networked systems. pp. 281–288. Springer, Cham.
Pirandola, S., Andersen, U. L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J. L., & Wallden, P. (2020). Advances in quantum cryptography. Advances in Optics and Photonics, 12(4), 1012–1236.
Sharma, G. and Kalra, S. (2016). A novel scheme for data security in cloud computing using quantum cryptography. In Proceedings of the international conference on advances in information communication technology and computing pp. 1–6.
Zhou, T., Shen, J., Li, X., Wang, C., & Shen, J. (2018). Quantum cryptography for the future internet and the security analysis. Security and Communication Networks, 2018, 1–7.
Borges, F., Reis, P. R., & Pereira, D. (2020). A comparison of security and its performance for key agreements in post-quantum cryptography. IEEE Access, 8, 142413–142422.
Babber, K. and Singh, J.P., (2021). Quantum cryptography and security analysis. Journal of Discrete Mathematical Sciences and Cryptography, pp. 1–12.
Jassem, Y.H., & Abdullah, A.A. (2020). Enhancement of quantum key distribution protocol for data security in cloud environment. Icic International, 11(3), 279–288.
Marco, L., Andrew, S., Romain, A., Christopher, C., Degiovanni, I. P., Gramegna, M., … & Zhiliang, Y. (2018). Implementation Security of Quantum Cryptography-Introduction, challenges, solutions ETSI White Paper No. 27.
Thayananthan, V., & Albeshri, A. (2015). Big data security issues based on quantum cryptography and privacy with authentication for mobile data center. Procedia Computer Science, 50, 149–156.
Bhatt, A. P., & Sharma, A. (2019). Quantum cryptography for internet of things security. Journal of Electronic Science and Technology, 17(3), 213–220.
Cheng, C., Lu, R., Petzoldt, A., & Takagi, T. (2017). Securing the Internet of Things in a quantum world. IEEE Communications Magazine, 55(2), 116–120.
Gabriel, A. J., Alese, B. K., Adetunmbi, A. O., & Adewale, O. S. (2015). Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secur. Trans. (JITST), 4(1), 351–357.
Qiu, L., Sun, X., & Xu, J. (2018). Categorical quantum cryptography for access control in cloud computing. Soft computing, 22(19), 6363–6370.
Verma, P., & Lohiya, R. (2015). A comprehensive survey on: Quantum cryptography. International Journal of Science and Research, 4(4), 2214–2219.
Dasari, V.R., Sadlier, R.J., Geerhart III, B.E. and Humble, T.S. (2018). Demonstration of provably secure quantum key distribution (QKD). In Disruptive technologies in information sciences, vol. 10652, pp. 65–71. SPIE.
Murugan, G. (2020). An efficient algorithm on quantum computing with quantum key distribution for secure communication. International Journal of Communications, 5, 12–23.
Shi, R. H., Liu, B., & Zhang, M. (2021). Verifiable quantum key exchange with authentication. International Journal of Theoretical Physics, 60(1), 227–242.
Acknowledgements
The author with a deep sense of gratitude would thank the supervisor for his guidance and constant support rendered during this research.
Funding
No Financial support.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
This paper has no conflict of interest for publishing.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ahilan, A., Jeyam, A. Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution. Wireless Pers Commun 129, 549–567 (2023). https://doi.org/10.1007/s11277-022-10110-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-10110-8