Network Security Based on Quantum Cryptography & Multi-qubit Hadamard Matrices

Article ID

E02W7

Network Security Based on Quantum Cryptography & Multi-qubit Hadamard Matrices

Dr. Sandip Dutta
Dr. Sandip Dutta Birla Institute of Technology, Mesra, Ranchi
Anand Kumar
Anand Kumar
N.C.Mahanti
N.C.Mahanti
DOI

Abstract

An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain existing algorithms and makes the transmission of data through an insecure channel less vulnerable to various attacks. The algorithm uses the concept of bases: rectilinear and diagonal for the sender and the receiver respectively [1]. This is a deterministic algorithm in which the two communicating parties use the same orthogonal bases to measure each qubit in the transmitted message. The algorithm uses the concept described by Lester-Hill [2] in the intermediate steps of the cryptographic process. The key that is transmitted over the network is made less vulnerable to the man-in-the-middle attack using the Diffie-Hellman concept of key exchange [3].

Network Security Based on Quantum Cryptography & Multi-qubit Hadamard Matrices

An approach is described for generating a secret key using polarized photons in quantum systems. A message is encoded and decoded by using code generated through the properties of Hadamard matrices. The algorithm uses the features of certain existing algorithms and makes the transmission of data through an insecure channel less vulnerable to various attacks. The algorithm uses the concept of bases: rectilinear and diagonal for the sender and the receiver respectively [1]. This is a deterministic algorithm in which the two communicating parties use the same orthogonal bases to measure each qubit in the transmitted message. The algorithm uses the concept described by Lester-Hill [2] in the intermediate steps of the cryptographic process. The key that is transmitted over the network is made less vulnerable to the man-in-the-middle attack using the Diffie-Hellman concept of key exchange [3].

Dr. Sandip Dutta
Dr. Sandip Dutta Birla Institute of Technology, Mesra, Ranchi
Anand Kumar
Anand Kumar
N.C.Mahanti
N.C.Mahanti

No Figures found in article.

Dr. Sandip Dutta. 1970. “. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 12): .

Download Citation

Journal Specifications
Classification
Not Found
Keywords
Article Matrices
Total Views: 20517
Total Downloads: 10739
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Network Security Based on Quantum Cryptography & Multi-qubit Hadamard Matrices

Dr. Sandip Dutta
Dr. Sandip Dutta Birla Institute of Technology, Mesra, Ranchi
Anand Kumar
Anand Kumar
N.C.Mahanti
N.C.Mahanti

Research Journals