SuperCrypt: A Novel Technique of Quantum Cryptography Simultaneously
SuperCrypt: A Novel Technique of Quantum Cryptography
Simultaneously Improving Both Security Level and Data Rate
Kazi Sinthia Kabir, and Tusher Chakraborty
Email: [email protected], [email protected]
Qubit (quantum bit): The basic unit in quantum
computation, which is a linear superposition of 0 and
1 . A qubit is generally represented as follows,
where and determine the corresponding extents
Quantum entanglement: A quantum mechanical
phenomenon that describes quantum states of two
objects with reference to each other, even though the
individual objects may be spatially separated .
Superdense Coding: A Method of quantum
communication to increase the rate of transferred
Quantum Cryptography: Use of quantum
computation to perform cryptographic tasks .
Security in traditional quantum cryptography is
based on selection of a basis for measurement of
photons, which carry the values of qubits.
If an intruder fails to select the basis correctly, he
cannot extract the data.
System Model of
Our Proposed Technique
Steps at the Sender Side
1.Encode the message with key
using XOR operation.
2.Permute the bit positions of the
key according to predefined rules
known both by sender and receiver.
Key : 1 0 1 1 0 0 1 0
key : 0 1 0Coding
0 1 1 1 of
the modified key string.
4.Send the Superdense coded
photons for transmitting the key.
Key bit positions Photon position
Our system largely depends on
entanglement of qubits. However, if a
qubit is measured, its entanglement is
Therefore, we propose to utilize either of
the following methods:
Recycling qubits , and
Re-establishing entanglement .
Photon position Key bit positions
Table: Bit selection for Superdense Decoding
Superdense 3.Permute the bit positions of the key
in a reverse manner according to
predefined rules to extract the original
Figure: Block diagram of proposed encryption technique.
Received key : 0 1 0 0 1 1 1 0
Reverse Permutated Key: 1 0 1 1 0 0 1 0
4.Decode the message using XOR
operation with the key.
Table: Bit selection for Superdense Coding
1.Receive the Superdense coded
2.Decode from the Superdense coded
Steps at the Receiver Side
Conclusion and Future Work
As even quantum encryption comes under
security threats in recent times, we propose a
highly-secure technique of quantum encryption
with higher information transfer rate.
The computational power of practical
quantum computers is increasing day-by-day,
which might cause threat even to our proposed
technique in future. Therefore, we plan to
incorporate a third level of encryption by
changing the basis of photon to make the
system more secured.
We plan to explore synchronization between
the information transmitted through the
quantum channel and the classical channel.
We also plan to perform simulation of our
 A. V. Sergienko, Quantum communications and
cryptography, Taylor and Francis, 2006.
 C. G. Yale, B. B. Buckley, D. J. Christle,L. C.
Bassett, and D. D. Awschalom, All-optical control of
a solid-state spin using coherent dark states,
National Academy of Sciences, vol. 110, no. 19, pp.
 University of Bristol. "Quantum computing with
recycled particles." ScienceDaily. 23 October 2012.
Last accessed: 22 March, 2015.
 C. H. Bennett and S. J.Wiesner, Communication
via one-and twoparticle operators on einsteinpodolsky-rosen states Physical review letters, vol.
69, p. 2881, 1992.
 Abdi, Mehdi, Paolo Tombesi, and David Vitali.
"Entangling two distant noninteracting microwave
modes." Annalen der Physik 527.1-2, 2015.
Department of Computer Science and Engineering (CSE), BUET
"Well he seemed so low that I couldn't say no" -Robert Service ("The Cremation of Sam McGee, pg. 709) Sound Devices cont. Alliteration: The repetition of a sound at the beginning of a series of words "Peter Piper picked a...
Plan a warm up for your sport. Write a summary of the benefits of a warm up. ... Variance / Tedium, Overload, Progression, Warm-Up / Cool-Down, Frequency. G453 June 2012. Explain the use of periodisation when planning a personal health...
Chapter 44 Osmoregulation and Excretion Fig. 44-2 Fig. 44-2 Selectively permeable membrane Net water flow Hyperosmotic side Hypoosmotic side Water Solutes Osmoregulation- the control of the concentration of body fluids.
What Is Globalization? Globalization is the socioeconomic reform process of eliminating trade, investment, cultural, information technology, and political barriers across countries.. It can lead to increased economic growth and geopolitical integration and interdependence among nations of the world.
Airshed may still experience actual increase if the site is "over-permitted," that is, allowables much higher than actuals. 30 TAC 116 defines Project Emissions Increase (PEI), which will govern our reviews. Rulemaking will be required to accommodate Pruitt memo.
Von Helmholtz (1850) Helmholtz' technique was quite simple. He first cut out a muscle and an attached nerve fiber from a frog's leg. The experiment then consisted of stimulating the nerve at various distances from the muscle and measuring the...
Rate the value of the price of admission compared to your museum experience. Poor Value - - - - - Great Value. ... Julianne Kever. Interpreters. Questions, Comments, Concerns. Question Development. Stylistic and Technical Design. Two Digital Surveys. NHA Interests.
Ready to download the document? Go ahead and hit continue!