Distance Enhancement of Quantum Cryptography through MANET
DOI:
https://doi.org/10.32628/IJSRST229214Keywords:
Quantum cryptography, Quantum communication, Internet Security, MANET, AODV.Abstract
In the modern technology world, the cryptographic techniques are plays a major role. There are so many modern cryptographic algorithms are used to secure information through message transformation. Quantum cryptography evolved from the merging of physics and cryptography to reduce the threat that encryption encounters. It is one of the emerging fields in the computer technology. The primary objective of quantum cryptography research is to develop cryptographic algorithms and protocols that are resistant to quantum computer attacks and increase the communication distance. The various quantum cryptography protocols are demonstrated, as well as how this technology has led to the establishment of secure communication between sender and the receiver through using of MANET. We will look at the properties of quantum cryptography and the benefits of MANET it can provide in the future internet. One of the best ways for increasing the distance of message transmission over the internet is to use MANET in the field of quantum cryptography. An Ad hoc on demand distance vector (AODV) is a routing protocol for Mobile Ad hoc networks
References
- Tianqi Zhou, Jian Shen , Xiong Li, Chen Wang and Jun Shen “Quantum Cryptography for the Future Internet and the Security Analysis”, Hindawi Security and Communication Networks Volume 2018, Article ID 8214619, 7 pages https://doi.org/10.1155/2018/8214619.
- Faisal Abbasi1, Pawan Singh, “Quantum Cryptography: The Future of Internet and Security Analysis”, Journal of Management and Service Science, 2021, Vol. 01, Iss. 01, S. No. 004, pp. 1-12.
- R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985.
- M. Curty and D. J. Santos, “Quantum authentication of classical messages,” Physical Review A: Atomic, Molecular and Optical Physics, vol. 64, no. 6, 2001.
- Laszlo Gyongyosi, Laszlo Bacsardi and Sandor Imre, “A Survey on Quantum Key Distribution“ in Info communications Journal, volume XI in June 2019.
- Alharith A. Abdullah, Rifaat Z. Khalaf and Hamza B. Habib, “Modified BB84 Quantum Key Distribution Protocol Using Legendre Symbol”in 2nd Scientific Conference of Computer Sciences (SCCS), IEEE, 2019
- Bennett, C. H., & Brassard, G. (1987). “Quantum public key distribution reinvented”, ACM SIGACT News, 18(4), 51-53.
- Bennett, C. H., Brassard, G., & Ekert, A. K. (1992). “Quantum cryptography”, Scientific American, 267(4), 50-57.
- Bennett, C. H., & DiVincenzo, D. P. (2000). “Quantum information and computation”, nature, 404(6775), 247-255.
- T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985.
- Y.M. Tseng, “An efficient two-party identity-based key exchange protocol,” Informatica, vol. 18, no. 1, pp. 125–136, 2007.
- C. H. Ugwuishiwu, U. E. Orji, C. I. Ugwu, C. N. Asogwa, “An overview of Quantum Cryptography and Shor’s Algorithm”, C. H. Ugwuishiwu et al., International Journal of Advanced Trends in Computer Science and Engineering, 9(5), September - October 2020, 8397 – 8405.
- Masahiro Takeoka, Mikio Fujiwara, Masahide Sasaki, “R&D Trends and Future Prospects of Quantum Cryptography”, New Breeze Winter 2019.
- “Special issue: Quantum data communication”, Journal of National Institute of Information and Communications Technology, Vol. 64, No. 1 (2017).
- Chainika Singhal , Ravinder Kr.Gautam , Lakshman Das, Manoj Kumar.Mishra , “Enhancement of Quantum Key Distribution Protocol”, IJESRT, ISSN: 2277-9655.
- Alekha Parimal Bhatt,| Anand Sharma, ” Quantum Cryptography for Internet of Things Security”, Journal of Electronic Science and Technology, vol. 17, no. 3, september 2019.
- N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Reviews of Modern Physics, vol. 74, no. 1, pp. 145-195, Jan. 2002.
- Christof Paar and Jan Pelzl. Understanding Cryptography - A Textbook for Students and Practitioners. Springer-Verlag Berlin Heidelberg, 2010.
- Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Azizi, “Quantum Key Distribution Protocols: A Survey”, International Journal of Universal Computer Sciences (Vol.1-2010/Iss.2) Elboukhari et al. / Quantum Key Distribution Protocols: A Survey / pp. 59-67.
- Burhan Ul Islam Khan, Rashidah Funke Olanrewaju, Farhat Anwar, Athaur Rahman Najeeb, Mashkuri Yaacob, “A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions”, Indonesian Journal of Electrical Engineering and Computer Science Vol. 12, No. 2, November 2018, ISSN: 2502-4752,pp. 832~842.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.