- ABSTRACT
The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors’ knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.
Existing System with Limitations
Current implementations of quantum cryptography protocols, particularly the BB84 protocol, have been widely adopted for secure communication. However, they face several limitations:
- Susceptibility to Brute Force and Cryptanalytic Attacks: As computational power increases, classical cryptography and key management schemes, which rely on computational complexity, become more vulnerable to brute force and cryptanalytic attacks.
- Siphoning Attacks on Multiple Photons: The BB84 protocol is susceptible to siphoning attacks due to the multiple photons emitted by practical laser sources, which can compromise the security of the communication.
- Limited Practical Implementations: Existing quantum cryptography protocols are often implemented in controlled environments and have limited practical deployment in free-space communication scenarios.
Proposed System with Advantages
The proposed system introduces the implementation of a three-stage quantum communication protocol in free-space, addressing the limitations of existing systems:
- Enhanced Security: The three-stage protocol obviates some of the known vulnerabilities of current quantum cryptography implementations, such as siphoning attacks on multiple photons, providing a more secure communication method.
- Multiple Photon Utilization: This implementation is the first to use multiple photons for secure communication, enhancing the robustness and reliability of the quantum protocol.
- Free-Space Communication: By implementing the protocol in free-space, the system demonstrates practical applicability for real-world scenarios, moving beyond controlled laboratory environments.
SYSTEM REQUIREMENTS
SOFTWARE REQUIREMENTS:
• Web Technologies : HTML, CSS, JS. JSP
• Programming Language : Java and J2EE
• Database Connectivity : JDBC
• Backend Database : MySQL
• Operating System : Windows 08/10
HARDWARE REQUIREMENTS:
- Processor : Core I3
- RAM Capacity : 2 GB
- Hard Disk : 250 GB
- Monitor : 15″ Color
- Mouse : Two or Three Button Mouse
- Key Board : Windows 08/10