2018
DOI: 10.31142/ijtsrd18723
|View full text |Cite
|
Sign up to set email alerts
|

End to End Encryption using QKD Algorithm

Abstract: Today nearly all of the people are involved in communicating each other with the help of online communication. Nearly three fourth of the world are connected via social media. So it is very important to secure the data transmission between the user. And in addition to this future of computer's will be of by Quantum technologies. So the In this paper we are going to see how to increase the security of online transmission through Quantum shift distribution algorithm. In this paper idea outlines the implementatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…The various data protection algorithms like AES, RSA, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Two-parameter with a Wide-range system Mixed Coupled Map Lattice model (TWMCML), Double Parameters Fractal Sorting Matrix (DPFSM), Double Parameters Fractal Sorting Vector (DPFSV), Fractal Sorting Matrix (FSM), an algorithm based on the thought of improved ant colony walking path, triple-image encryption and hiding algorithm are implemented on cloud computing and image protection in the literature 2,[8][9][10][11][12][13][14][15] . Moreover, the various encryption methods include the application of Quantum Key Distribution (QKD) for information security [16][17][18][19] . In literature, physical layer impairment (PLI)-aware shared path protection (SPP) scheme for single-link failures in transparent optical WDM mesh networks have been considered.…”
mentioning
confidence: 99%
“…The various data protection algorithms like AES, RSA, Blowfish, Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Two-parameter with a Wide-range system Mixed Coupled Map Lattice model (TWMCML), Double Parameters Fractal Sorting Matrix (DPFSM), Double Parameters Fractal Sorting Vector (DPFSV), Fractal Sorting Matrix (FSM), an algorithm based on the thought of improved ant colony walking path, triple-image encryption and hiding algorithm are implemented on cloud computing and image protection in the literature 2,[8][9][10][11][12][13][14][15] . Moreover, the various encryption methods include the application of Quantum Key Distribution (QKD) for information security [16][17][18][19] . In literature, physical layer impairment (PLI)-aware shared path protection (SPP) scheme for single-link failures in transparent optical WDM mesh networks have been considered.…”
mentioning
confidence: 99%