Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key

Authors

  • N Srilatha Department of Computer Science and Engineering, Rajiv Gandhi University of Knowledge Technology, AP-IIIT, India
  • M Deepthi Department of Computer Science and Engineering, CMR Engineering College, Hyderabad, India
  • I Rajasekhar Reddy Department of Computer Science and Engineering, JNTUA College of Engineering, Pulivendula, India

Keywords:

BB84 protocol, Quantum Cryptography (QC), DNA, QDNA, QuBits

Abstract

The Privacy is paramount when communicating subtle information, and humans have devised some unusual ways to encode their conversations. The Quantum Key Distribution agrees for the secure transmission of unbreakable encryption keys and it provides a flawless secure coding to solve the problem of key distribution. At present this is more mature application in the field of quantum computing. The fundamental concept of this protocol involves two parties, wishing to exchange a key both with access to a classical public communication channel and a quantum communication channel. The entanglement distillation approach of BB84 is widely used because the act of reading a quantum bit (QuBits) changes the bit, it is difficult for hackers to interfere without being detected sufficient number of bits. But this technique uses only four directions of electron movements so it is possible to guess the key. To overcome these drawbacks here two level QRNA technique is proposed for security. In first level DNA is applied on plain text after BB84 protocol is applied. This method provides better security than both BB84 protocol and DNA alone.

References

B.Jyoshna”Mechanisms for secure data transmission A Survey”, Published in International of Computer Science and Engineering(IJCSE), Vol.-2(8), PP(82-83) August 2014.

R.Shah and Y. S. Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2(1),pp. 22-28, Feb 2014

Alia, M.A., Yahya,A., “Public–Key Steganography Based on Matching Method”, European Journal of Scientific Research, Vol(2), PP223-231 Aug (2010).

G. Cui, L. Qin, Y. Wang and X. Zhang, “An encryption scheme using DNA technology”, Bio Inspired Computing: Theories and Applications, pp. 37-42, 2008.

Z. Chen and J. Xu, "One-time-pads encryption in the tile assembly model," Bio-Inspired Computing: Theories and Applications,Vol-46 pp.23- 30,may 2008.

E Suresh Babu, C Nagaraju, MHM Krishna Prasad “Analysis of Secure Routing Protocol for Wireless Adhoc Networks Using Efficient DNA Based Cryptographic Mechanism” published in Procedia Computer Sciencedec-. Vol-70PP:341-347 , Oct 2015.

Ashok Sharma, R S Thakur and Shailesh Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol. 4(5), pp.5-11, Oct 2016

R Pradeep Kumar Reddy, C Nagaraju, N Subramanyam ”Text encryption through level based privacy using dna steganography” published in International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) ,vol-3 PP168-172,May-jun 2014.

Mamta Rani1 and Sandeep Jain,”DNA Computing and Recent Developments”. International journal of computer science and Engineering, Vol.2, PP.16-19,April 2014.

Kritika Gupta, “ DNA Based Cryptographic Techniques: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering,vol(3), pp. 607-610, March 2013.

Komal Kumbharkar, “An improved Symmetric key cryptography with DNA based strong cipher”, international journal of advanced and innovative research, (IJCSE) ,Vol(2),PP2278-7844,May-jun2013.

Sharmeen kaur, Raveena Singh and Shivya Gagneja “Network Security and Methods of Encoding and Decoding”. International journal of computer science and Engineering, Vol.-2(2), pp (11-15) Feb 2014.

Pallab Banerjee1 and Anita Kumari2,Puja Jha3 “Comparative Performance Analysis of Optimized Performance Round Robin Scheduling Algorithm(OPRR) with AN Based Round Robin Scheduling Algorithm using Dynamic Time Quantum in Real Time System with Arrival Time”. International journal of computer sciences and Engineering, Vol.-3(5), pp. 309-316, May 2015.

Azarderakhsh, mehran mozaffar kermani, David jao,”post quantum cryptography on FPGA based on isolegines on elliptic curves” IEEE journal,VOL(64),pp86-99,2017

Downloads

Published

2025-11-11

How to Cite

[1]
N. Srilatha, M. Deepthi, and I. Rajasekhar Reddy, “Robust Quantum Key Distribution Based on Two Level Qdna Technique to Generate Encrypted Key”, Int. J. Comp. Sci. Eng., vol. 5, no. 2, pp. 15–19, Nov. 2025.

Issue

Section

Research Article