Security

An Effective Technique For Data Security in Modern Cryptosystem

Download Now Free registration required

Executive Summary

Present paper provides a conceptual framework on the proposed C-QUBITS Key exchange technique, which is used as a base for the data security through quantum computing in the modern cryptosystem. In the first phase a detailed description of the BB84 Cryptographic protocol is given, which is used as a standard protocol for quantum key distribution in quantum cryptography and the emphasis is also given on the loopholes present in this protocol which makes it less effective than it pretends to be. In the next phase the focus is made on the C-QUBITS technique, which can be used for the exchange of key between the sender and the receiver.

  • Format: PDF
  • Size: 220.9 KB