Improvising Security Issues Using Quantum Cryptography  
  Authors : Abhishek Pradhan; Sushree Soujanya Padhi; B.Giridhar; Chandan Kumar Giri


Stegnography is the technique of hiding confidential information within any media. In recent years various stegnography methods have been proposed to make data more secure. At the same time different steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied over the years. Various tools for detecting hidden informations are easily available over the internet, so securing data from steganalyst is still considered a major challenge. While various work have been done to improve the existing algorithms and also new algorithms have been proposed to make data behind the image more secure. We have still been using the same public key cryptography like Deffie-Hellman and RSA for key negotiation which is vulnerable to both technological progress of computing power and evolution in mathematics, so in this paper we have proposed use of quantum cryptography along with stegnography. The use of this combination will create key distribution schemes that are uninterceptable thus providing our data a perfect security.


Published In : IJCAT Journal Volume 1, Issue 9

Date of Publication : 31 October 2014

Pages : 480 - 485

Figures :04/p>

Tables : --

Publication Link : Improvising Security Issues Using Quantum Cryptography




Abhishek Pradhan : B.Tech Student

Sushree Soujanya Padhi : B.Tech Student

B.Giridhar : in CSE dept

Chandan Kumar Giri : in CSE dept











Quantum Cryptography

Securing the key distribution is as important as securing the data itself. In this paper we have made use of quantum cryptography thus improving the security of the keys and providing our data a perfect security. The use of quantum cryptography has added another layer of defense to our data. Even if we use most secure encryption algorithm and best stego technique to hide our data, if the keys gets compromised these security will be of no use. Quantum cryptography addresses current as well as emerging threats and it definitely has “competitive advantage” over other public key cryptosystems. We have used quantum cryptography only for key distribution rather than for entire messages because of limitations of transmission speeds and hardware expenses.










[1] Manindra Agrawal, Neeraj Kayal, and Nitin Saxena (2004). Primes is in P. Annals of Mathematics, 160,781-793.doi: 10.4007/annals.2004.160.781 [2] Imran Sarwar Bajwa and Rubata Raisat (2011). A New Perfect Hashing based Approach for Secure Stegnograph. Digital Information Management (ICDIM),174-178. doi: 10.1109/ICDIM.2011.6093325 [3] Muhammad Asad, Junaid Gilani and Adnan Khalid (2011). An Enhanced Least Significant Bit Modification Technique for Audio Steganography Computer Networks and Information Technology (ICCNIT), 143-147. doi: 10.1109/ICCNIT.2011.6020921 [4] Mohammad Hamdaqa and Ladan Tahvildari (2011). ReLACK: A Reliable VoIP Steganography Approach. Fifth International Conference on Secure Software Integration and Reliability Improvement ,189- 197.doi: 10.1109/SSIRI.2011.24 [5] S. Changder, N.C. Debnath and D.Ghosh (2011). A Greedy Approach to Text Steganography using Properties of Sentences. Eighth International Conference on Information Technology: New Generations, 30-35. doi: 10.1109/ITNG.2011.13 [6] Piyush Marwaha and Paresh Marwaha (2010). VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN IMAGES. Second International conference on Computing, Communication and Networking Technologies, 1-6. doi: 10.1109/ICCCNT.2010.5591730 [7] Jinsuk Baek, Cheonshik Kim, Paul S. Fisher and Hongyang Chao (2010). (N. 1) Secret Sharing Approach Based on Steganography with Gray Digital Images. IEEE Conference on Wireless Communications, Networking and Information Security (WCNIS) ,325-329.doi: 10.1109/WCINS.2010.5541793 [8] Ferruccio Pisanello, Luigi Martiradonna, Piernicola Spinicelli, Angela Fiore and Jean-Pierre Hermier (2009). Polarized Single Photon Emission for Quantum Cryptography Based on Colloidal Nanocrystals. 11th international conference on Transparent Optical Networks,1-4. doi: 10.1109/ICTON.2009.5185131 [9] Vladimir L. Kurochkin and Igor G.Neizvestny (2009). Quantum Cryptography. 10th INTERNATIONAL CONFERENCE AND SEMINAR EDM'2009, 166- 170. doi: 10.1109/EDM.2009.5173960 [10] Mehrdad S. Sharbaf (2009). Quantum Cryptography: A New Generation of Information Technology Security System. Sixth International Conference on Information Technology: New Generations, 1644- 1648.