A new approach to digital content privacy using quantum spin and finite-state machine
- 58 Downloads
Transmission of digital contents over public channel with access restricted to intended beneficiary even the contents are intercepted by others. In technological ages, cryptography plays a vital role in broadcasting, network communication, cell phones, etc. for transmitting sensitive information. The era of quantum information processing has many applications in daily life and one of its implications in data security. The data security and quantum information are two different modules of information processing that uses the notion of qubit model instead of classical information theory. It uses quantum mechanics instead of classical mechanics for information processing (covert communication). Elements of quantum theory have energy and angular momentum called spin, which carries the polarization. The purpose of writing this article is to introduce the concept spinning from quantum dynamics in data security, which leads to the development of quantum cryptography. The scope of this article is to protect contents’ privacy by polarized spin matrices passed by finite-state machine at secret phase information.
Both authors Dr. Majid Khan and Hafiz Muhammad Waseem are greatly thankful to Vice Chancellor Dr. Syed Wilayat Hussain and Dean Dr. Iqbal Rasool Memon, Institute of Space Technology, Islamabad Pakistan, for providing the decent environment for research and development.
- 16.S. Etemadi Borujeni, M. Eshghi, 2009. Chaotic image encryption design using Tompkins–Paige algorithm. Math. Probl. Eng. 2009Google Scholar
- 21.M.R. Albrecht, K.G. Paterson, G.J. Watson Plaintext recovery attacks against SSH. in 30th IEEE Symposium on Security and Privacy, 2009. (IEEE, 2009), pp. 16–26Google Scholar
- 24.J. Morris, Implications of quantum information processing on military operations. Cyber Def. Rev. 2(3) (2015)Google Scholar
- 25.J. Preskill, Introduction to quantum information (part 1). Institute for Quantum Computing—CSSQI 2012 (2012), Online Lecture, http://iqim.caltech.edu/2012/11/27/john-preskill-introduction-to-quantum-information-part-1-cssqi-2012/
- 27.R.J. Hughes, W.T. Buttler, P.G. Kwiat, S.K. Lamoreaux, G.G. Luther, G.L. Morgan, J.E. Nordholt, C.G. Peterson, Quantum cryptography for secure free− space communications. in Free− Space Laser Communication Technologies XI, vol. 3615 (International Society for Optics and Photonics, 1999), pp. 98–104Google Scholar
- 31.S.E. Venegas− Andraca, S. Bose, Quantum computation and image processing: new trends in artificial intelligence. in IJCAI (2003) p. 1563Google Scholar
- 32.S.E. Venegas− Andraca, S. Bose, Storing, processing, and retrieving an image using quantum mechanics. In: Quantum Information and Computation, vol. 5105. (International Society for Optics and Photonics, 2003 ), pp. 137–148Google Scholar
- 38.P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring. in 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings. (IEEE, 1994), pp. 124–134Google Scholar
- 41.J. Branson, Quantum Physics 130. UCSD (2002) https://quantummechanics.ucsd.edu/ph130a/130_notes/node275.html
- 49.H. Varshney, H. Gupta, M. Kushwaha, Image encryption using chaotic logistic map. Int. J. Electr. Electron. Comput. Sci. Eng. 4, 40–45 (2017)Google Scholar
- 52.R.E. Boriga, A.C. Dăscălescu, A.V. Diaconu, A new fast image encryption scheme based on 2D chaotic maps. IAENG Int. J. Comput. Sci. 41(4), 249–258 (2014)Google Scholar