Quantum Key Distribution Based-on Refraction and Polarization Entanglement
Gunasekaran M1, Gopalakrishnan B2, Amitabh Wahi3

1Gunasekaran M, Associate Professor, Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu.
2Gopalakrishnan B, Associate Professor, Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu.
3Amitabh Wahi, Professor, Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu.
Manuscript received on March 12, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on March 30, 2020. | PP: 2911-2918 | Volume-8 Issue-6, March 2020. | Retrieval Number: F8222038620/2020©BEIESP | DOI: 10.35940/ijrte.F8222.038620

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography is the specialty of encoding and decoding messages and exists as extended as the individuals have doubted from one another and need secure correspondence. The traditional techniques for encryption naturally depend on any among public key or secret key approaches. In general, the public key encryption depends on two keys, for example, public key and private key. Since encryption and decryption keys are different, it isn’t important to safely distribute a key. In this approach, the difficult of the numerical issues is assumed, not demonstrated. All the security will be easily compromised if proficient factoring algorithms are found. In secret key encryption two clients at first create secret key, which is a long string of arbitrarily selected bits and safely shares between them. At that point the clients can utilize the secret key along with the algorithms to encryption and decryption information. The procedures are complicated and also planned such a way that every bit of output is based on every bit of input. There are two fundamental issues with secret key encryption; first one is that by breaking down the openly known encoding algorithms, it gets simpler to decrypt the message. The subsequent one is that it experiences key-conveyance issue. As a result of the ongoing improvements in quantum processing and quantum data hypothesis, the quantum computers presents genuine difficulties to generally utilized current cryptographic strategy. The improvement of quantum cryptography beat the deficiencies of old style cryptography and achieves these huge accomplishments by using the properties of infinitesimal articles, for example, photon with its polarization and entangled state. In this paper, Polarization by refraction based quantum key distribution (PR-QKD) is proposed for quantum key generation and distribution. The proposed work considers three basis of polarization such as rectilinear (horizontal and vertical), circular (left-circular and right-circular), ellipse (left-ellipse and right-ellipse) and refraction factor. This quantum key can be used for secure communication between two users who are spatially separated and also offer intrusion detection ability to detect attackers. The theoretical approach and conceptual results are discussed in this paper.
Keywords: Quantum Key Distribution, Polarization, Refraction, Photon, Secure Communication.
Scope of the Article: Wireless Communication.