High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A Secure Communication through Quantum Cryptography


Deepak Kumar Verma , Babasaheb Bhimrao Ambedkar University, satellite Campus, Amethi


Cryptography, Quantum Cryptography, Photons, Light Wave


today the information security has become the most critical and challenging task not only in defense but also in every environment, weather it may be a government organization or it may be the information of a common people. At present several techniques are available that provides the information security using various algorithmic mechanism like encryption - decryption and many more. Each of these classical techniques provides the more powerful locks to secure the information from eavesdroppers. But the possibility of the lock to be broken or the leakage of information always exists in every mechanism. Each security mechanism available today is lagging in terms of reliability either in one or more parameters i.e. we are not assure that this particular method will provide the security throughout the data transmission. So once again information security has become the most challenging task because no method available today is as reliable that it can provide the hundred percent assurance of information security and we can depend upon. Here we have described a new technique towards the information security through Quantum Cryptography that provides a new way of protecting data when it travels in the network. This method introduces the concept of quantum mechanics or light waves to protect the data from being hacked since according to the property of light we can’t measure the two interrelated properties individually without affecting the other. Here in this paper we have described that how we can use the quantum mechanics in the area of information security to provide a more reliable technique that will raise the alarm at the very arrival of burglar.

Other Details

Paper ID: IJSRDV4I120144
Published in: Volume : 4, Issue : 12
Publication Date: 01/03/2017
Page(s): 87-89

Article Preview

Download Article