A Quantum Encryption Algorithm based on the Rail Fence Mechanism to Provide Data Integrity
Received: 14 September 2024 | Revised: 6 October 2024 and 26 October 2024 | Accepted: 29 October 2024 | Online: 2 December 2024
Corresponding author: C. Atheeq
Abstract
The rapid development of quantum computer technology poses an increasing threat to conventional encryption algorithms, and accordingly, more advanced security practices need to be developed. The current paper presents an innovative quantum cryptographic mechanism that combines classical encryption techniques with quantum principles such as superposition, entanglement, and uncertainty to enhance data security in digital communication. The proposed scheme, defined as Enhanced Quantum Key Distribution (EQKD), demonstrates superior performance in key metrics, including Quantum Bit Error Rate (QBER), fidelity, key distribution rate, and resilience to eavesdropping. In particular, EQKD achieves lower QBER and higher fidelity over longer distances while also enhancing key generation efficiency and increasing the probability of detecting eavesdropping attempt. These findings highlight the effectiveness of EQKD in improving the security and reliability of quantum cryptographic systems.
Keywords:
quantum cryptography, integrity, encryption, communicationDownloads
References
N. Q. Luc, T. T. Nguyen, D. H. Quach, T. T. Dao, and N. T. Pham, "Building Applications and Developing Digital Signature Devices based on the Falcon Post-Quantum Digital Signature Scheme," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10401–10406, Apr. 2023.
S. Sonko, K. I. Ibekwe, V. I. Ilojianya, E. A. Etukudoh, and A. Fabuyide, " Quantum Cryptography and U.s. Digital Security: a Comprehensive Review: Investigating the Potential of Quantum Technologies in Creating Unbreakable Encryption and Their Future in National Security," Computer Science & IT Research Journal, vol. 5, no. 2, pp. 390–414, Feb. 2024
S. Ali and B. Djaouida, "Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 15133–15140, Aug. 2024.
S. K. Sahu and K. Mazumdar, "State-of-the-art analysis of quantum cryptography: applications and future prospects," Frontiers in Physics, vol. 12, Aug. 2024.
B. A. Alhayani, O. A. AlKawak, H. B. Mahajan, H. Ilhan, and R. M. Qasem, "Design of Quantum Communication Protocols in Quantum Cryptography," Wireless Personal Communications," Jul. 2023.
C.-H. Liao, C.-W. Yang, and T. Hwang, "Dynamic quantum secret sharing protocol based on GHZ state," Quantum Information Processing, vol. 13, no. 8, pp. 1907–1916, Aug. 2014.
J.-L. Zhang, J.-Z. Zhang, and S.-C. Xie, "A Choreographed Distributed Electronic Voting Scheme," International Journal of Theoretical Physics, vol. 57, no. 9, pp. 2676–2686, Sep. 2018.
D. W. Leung, "Quantum Vernam Cipher," Quantum Information and Computation, vol. 2, no. 1, pp. 14–34, Oct. 2001.
J. A. Dar, "Enhancing the data security of simple columnar transposition cipher by caesar cipher and rail fence cipher technique," International Journal of Computer Science & Engineering Technology (IJCSET), vol. 5, no. 11, pp. 2229–3345, 2014.
A. Banerjee, M. Hasan, and H. Kafle, "Secure Cryptosystem Using Randomized Rail Fence Cipher for Mobile Devices," Intelligent Computing, Cham, 2019, pp. 737–750.
S. Godara, S. Kundu, and R. Kaler, "An improved algorithmic implementation of rail fence cipher," International Journal of Future Generation Communication and Networking, vol. 11, no. 2, pp. 23–32, 2018.
Downloads
How to Cite
License
Copyright (c) 2024 Arshad Ali, M. A. H. Farquad, C. Atheeq, C. Altaf
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.