SuperCrypt: A Novel Technique of Quantum Cryptography Simultaneously
SuperCrypt: A Novel Technique of Quantum Cryptography
Simultaneously Improving Both Security Level and Data Rate
Kazi Sinthia Kabir, and Tusher Chakraborty
Email: [email protected], [email protected]
Qubit (quantum bit): The basic unit in quantum
computation, which is a linear superposition of 0 and
1 . A qubit is generally represented as follows,
where and determine the corresponding extents
Quantum entanglement: A quantum mechanical
phenomenon that describes quantum states of two
objects with reference to each other, even though the
individual objects may be spatially separated .
Superdense Coding: A Method of quantum
communication to increase the rate of transferred
Quantum Cryptography: Use of quantum
computation to perform cryptographic tasks .
Security in traditional quantum cryptography is
based on selection of a basis for measurement of
photons, which carry the values of qubits.
If an intruder fails to select the basis correctly, he
cannot extract the data.
System Model of
Our Proposed Technique
Steps at the Sender Side
1.Encode the message with key
using XOR operation.
2.Permute the bit positions of the
key according to predefined rules
known both by sender and receiver.
Key : 1 0 1 1 0 0 1 0
key : 0 1 0Coding
0 1 1 1 of
the modified key string.
4.Send the Superdense coded
photons for transmitting the key.
Key bit positions Photon position
Our system largely depends on
entanglement of qubits. However, if a
qubit is measured, its entanglement is
Therefore, we propose to utilize either of
the following methods:
Recycling qubits , and
Re-establishing entanglement .
Photon position Key bit positions
Table: Bit selection for Superdense Decoding
Superdense 3.Permute the bit positions of the key
in a reverse manner according to
predefined rules to extract the original
Figure: Block diagram of proposed encryption technique.
Received key : 0 1 0 0 1 1 1 0
Reverse Permutated Key: 1 0 1 1 0 0 1 0
4.Decode the message using XOR
operation with the key.
Table: Bit selection for Superdense Coding
1.Receive the Superdense coded
2.Decode from the Superdense coded
Steps at the Receiver Side
Conclusion and Future Work
As even quantum encryption comes under
security threats in recent times, we propose a
highly-secure technique of quantum encryption
with higher information transfer rate.
The computational power of practical
quantum computers is increasing day-by-day,
which might cause threat even to our proposed
technique in future. Therefore, we plan to
incorporate a third level of encryption by
changing the basis of photon to make the
system more secured.
We plan to explore synchronization between
the information transmitted through the
quantum channel and the classical channel.
We also plan to perform simulation of our
 A. V. Sergienko, Quantum communications and
cryptography, Taylor and Francis, 2006.
 C. G. Yale, B. B. Buckley, D. J. Christle,L. C.
Bassett, and D. D. Awschalom, All-optical control of
a solid-state spin using coherent dark states,
National Academy of Sciences, vol. 110, no. 19, pp.
 University of Bristol. "Quantum computing with
recycled particles." ScienceDaily. 23 October 2012.
Last accessed: 22 March, 2015.
 C. H. Bennett and S. J.Wiesner, Communication
via one-and twoparticle operators on einsteinpodolsky-rosen states Physical review letters, vol.
69, p. 2881, 1992.
 Abdi, Mehdi, Paolo Tombesi, and David Vitali.
"Entangling two distant noninteracting microwave
modes." Annalen der Physik 527.1-2, 2015.
Department of Computer Science and Engineering (CSE), BUET
Linear Thinking:Solving First Degree Equations. First Degree Equations. Techniques developed wherever math was studied. Rhind Papyrus. A quantity; its half and its third are added to it. It becomes 10. x + (1/2)x + (1/3)x = 10. False Position.
Idea: Divide [0, 1) into n equal-sized buckets. Distribute the n input values into the buckets. Sort each bucket. Then go through the buckets in order, listing elements in each one. Comp 122 An Example Comp 122 Bucket-Sort (A) BucketSort(A)...
Supercapacitor Charged via DIMM. Save / Restore @ ~10 sec/GB. Powered by SuperCapacitors in event of power-failure. DRAM Endurance & Speed NAND for Persistence. Fastest storage tier, 11GB/S, DDR3 DIMM speed & bandwidth more than 300% faster than PCI-E (3.2GB/S).
Various ways of conducting qualitative risk analysis exist. One method uses a scenario-based model. This approach is best for large cities, states, and countries because it is impractical to try to list all the assets, which is the starting point...
They ride the waves like a ship, extracting energy by using restraints at the bow of the device and along its length. The differing heights of waves along the length of the device causes flexing where the segments connect. The...
Stuart. Walker. 0900: Sumner's Corps deployed with two divisions. The lead division (Sedgwick) moved into the West Wood in a very tight formation of three Bde Lines. The following division (French), lost track of the lead division and drifted to...
(Not sharing the grass,middlegoat teasing the younger one) Make puppets fromsocks, brown paper bags or. Write the script for their new version and act out the story with puppets. How did they solve the problem? ... Make a synonym wall...
Ready to download the document? Go ahead and hit continue!