Professional Documents
Culture Documents
Secure Transmission Using
Secure Transmission Using
USING QUANTUM
CRYPTOGRAPHY FOR IoT
P H A S E 3 P R O J E C T P R E SE N T A T I O N
Implementation
Methodology
System
requirements
Test cases
DESIGN
USER 2 View
Request Download
Register Login
(receiver)
dataset Dataset Datase
(key)
Admin M Manage
anage Datasets Logout
Users
METHODOLOGY
6.Physical Security
4.Error Detection and 5.Classical
Measures &
Privacy Amplification: Cryptography
Authentication and
Integration:
Verification
used to reconcile differences generated secure key from the QKD
process is typically used in combination help prevent tampering &authenticity of
with classical cryptographic methods the communicated data, authentication
methods, and digital signatures might be
employed
IMPLEMENTATION
Quantum cryptography employs the principles of quantum mechanics to ensure secure communication. Quantum Key Distribution
(QKD) is a cornerstone, and the BB84 protocol is a fundamental algorithm within it.
QKD Setup: Two parties, Party A and Party B, share a quantum channel (fiber optic or free-space) and a classical communication
channel.
Key Generation: Party A randomly generates a string of quantum bits (qubits) encoded in a quantum state basis (usually either the
rectilinear basis, 0° and 90°, or the diagonal basis, 45° and 135°) and sends them to Party B.
Quantum Transmission: Party B randomly measures the received qubits in one of the two bases. Due to the principles of quantum
mechanics, any attempt to eavesdrop on the transmission will disturb the qubits, alerting Party A and Party B to the presence of an
intruder.
Key Reconciliation: Party A and Party B publicly announce their chosen bases for each qubit. They
discard the qubits measured in different bases and retain the matching ones to form a raw key.
Privacy Amplification: The raw key undergoes error correction and privacy amplification processes
to generate a shorter but secure final key.
Key Verification: Both parties perform tests to verify the quality and correctness of the final key.
This methodology ensures that any attempt to intercept or tamper with the communication will be
detectable, providing a high level of security for transmitting cryptographic keys.
TEST CASES
Test Case Description Input Expected Outcome
User downloads multiple files and Files are successfully downloaded and
11 Download multiple files with aggregate key applies an aggregate key decrypted using the aggregate key
Quantum key pair is used to encrypt the File is securely encrypted using quantum
16 Quantum key encryption during file upload file during upload keys
Quantum key exchange ensures secure Recipient can decrypt the forwarded file
17 Quantum-secure file forwarding forwarding of files using quantum keys
SYSTEM
REQUIREMENT
SPEC IFIC A
TIONSHARDWARE SOFTWARE
01 02
REQUIREMENTS REQUIREMENTS