The Community for Technology Leaders
RSS Icon
Jan. 28, 2013 to Jan. 30, 2013
ISBN: 978-1-4673-5740-1
pp: 6-11
Subhash Kak , Department of Computer Science, Oklahoma State University, Stillwater, OK 74078, USA
The paper presents the implementation of a quantum cryptography protocol for secure communication. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.
LabView, Quantum cryptography, three-stage protocol, polarization, rotation transformation, Muller Matrices, free-space, half-wave plate
Subhash Kak, "Multi-photon implementation of three-stage quantum cryptography protocol", ICOIN, 2013, 2013 International Conference on Information Networking (ICOIN), 2013 International Conference on Information Networking (ICOIN) 2013, pp. 6-11, doi:10.1109/ICOIN.2013.6496343
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool