Hybrid Quantum Key Distribution Protocol with Chaotic System for Securing Data Transmission

Authors

DOI:

https://doi.org/10.33633/jcta.v1i2.9547

Keywords:

Hybrid BB84, Post-Quantum Key Exchange, Secure Data Transmission, Quantum Cryptography, Quantum Key Distribution

Abstract

This research proposes a combination of Quantum Key Distribution (QKD) based on the BB84 protocol with Improved Logistic Map (ILM) to improve data transmission security. This method integrates quantum key formation from BB84 with ILM encryption. This combination creates an additional layer of security, where by default, the operation on BB84 is only XOR-substitution, with the addition of ILM creating a permutation operation on quantum keys. Experiments are measured with several quantum measurements such as Quantum Bit Error Rate (QBER), Polarization Error Rate (PER), Quantum Fidelity (QF), Eavesdropping Detection (ED), and Entanglement-based detection (EDB), as well as classical cryptographic analysis such as Bit Error Ratio (BER), Entropy, Histogram Analysis, and Normalized Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI). As a result, the proposed method obtained satisfactory results, especially perfect QF and BER, and EBD, which reached 0.999.

Author Biographies

De Rosal Ignatius Moses Setiadi, Dian Nuswantoro University

Sinta ID: 6007744Scopus ID: 57200208474

Muhamad Akrom, Dian Nuswantoro University

1   Informatics Engineering Department, Faculty of Computer Science, Dian Nuswantoro University, Semarang 50131, Indonesia2   Research Center for Materials Informatics, Faculty of Computer Science, Dian Nuswantoro University, Semarang 50131, Indonesia

References

D. R. I. M. Setiadi, R. Robet, O. Pribadi, S. Widiono, and M. K. Sarker, “Image Encryption using Half-Inverted Cascading Chaos Cipheration,” J. Comput. Theor. Appl., vol. 1, no. 2, pp. 61–77, Oct. 2023, doi: 10.33633/jcta.v1i2.9388.

B. M. P. Waseso and N. A. Setiyanto, “Web Phishing Classification using Combined Machine Learning Methods,” J. Comput. Theor. Appl., vol. 1, no. 1, pp. 11–18, Aug. 2023, doi: 10.33633/jcta.v1i1.8898.

P. N. Andono and D. R. I. M. Setiadi, “Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption,” IEEE Access, vol. 10, no. November, pp. 115143–115156, 2022, doi: 10.1109/ACCESS.2022.3218886.

E. Winarno, K. Nugroho, P. W. Adi, and D. R. I. M. Setiadi, “Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 9, p. 101790, Oct. 2023, doi: 10.1016/j.jksuci.2023.101790.

D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 9, pp. 6818–6828, Oct. 2022, doi: 10.1016/j.jksuci.2022.04.002.

E. Winarno, K. Nugroho, P. W. Adi, and D. R. I. M. Setiadi, “Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption Based on Hyperchaotic System,” IEEE Access, vol. 11, pp. 69005–69021, 2023, doi: 10.1109/ACCESS.2023.3285481.

C. Han, “An image encryption algorithm based on modified logistic chaotic map,” Optik (Stuttg)., vol. 181, no. December 2018, pp. 779–785, Mar. 2019, doi: 10.1016/j.ijleo.2018.12.178.

C. Bernhardt, Quantum Computing for Everyone. Fairfield University: MIT Press, 2019.

S. K. Sehgal and R. Gupta, SOA Based BB84 Protocol for Enhancing Quantum Key Distribution in Cloud Environment, vol. 130, no. 3. Springer US, 2023. doi: 10.1007/s11277-023-10354-y.

P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. doi: 10.1109/SFCS.1994.365700.

L. K. Grover, “A fast quantum mechanical algorithm for database search,” in Proceedings of the twenty-eighth annual ACM symposium on Theory of computing - STOC ’96, 1996, pp. 212–219. doi: 10.1145/237814.237866.

R. Kuang and A. Chan, “Quantum encryption in phase space with displacement operators,” EPJ Quantum Technol., vol. 0, 2023, doi: 10.1140/epjqt/s40507-023-00183-0.

G. S. Vernam, “Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications,” Trans. Am. Inst. Electr. Eng., vol. XLV, pp. 295–301, Jan. 1926, doi: 10.1109/T-AIEE.1926.5061224.

C. E. Shannon, “Communication Theory of Secrecy Systems*,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, Oct. 1949, doi: 10.1002/j.1538-7305.1949.tb00928.x.

B. Qi, L. Qian, and H. Lo, “Quantum Encryption,” in Optical and Digital Image Processing, Wiley, 2011, pp. 769–787. doi: 10.1002/9783527635245.ch34.

A. A. Abdullah and S. S. Mahdi, “Implementing Quantum Image Security Algorithm Based on Geometric Transformation and Quantum Random Number Generation,” J. Eng. Sci. Technol., vol. 17, no. 5, pp. 3570–3582, 2022.

A. M. A. Al-muqarm, F. Abedi, and A. S. Abosinnee, “Quantum Computing Cryptography and Lattice Mechanism,” J. Inf. Commun. Converg. Eng., vol. 20, no. 4, pp. 242–249, 2022, doi: 10.56977/jicce.2022.20.4.242.

N. S. Yanofsky and M. A. Mannucci, Quantum Computing for Computer Scientists. Brooklyn College, City University of New York: Cambridge University Press, 2008.

H. Shu, “Asymptotically Optimal Prepare-Measure Quantum Key Distribution Protocol,” Int. J. Theor. Phys., vol. 62, no. 8, pp. 1–13, 2023, doi: 10.1007/s10773-023-05447-0.

C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” J. Cryptol., vol. 5, no. 1, pp. 3–28, 1992, doi: 10.1007/BF00191318.

A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett., vol. 67, no. 6, pp. 661–663, Aug. 1991, doi: 10.1103/PhysRevLett.67.661.

G. Vest et al., “Quantum key Distribution with a Hand-Held Sender Unit,” Phys. Rev. Appl., vol. 18, no. 2, p. 024067, Aug. 2022, doi: 10.1103/PhysRevApplied.18.024067.

L. Moysis, A. Tutueva, C. Volos, D. Butusov, J. M. Munoz-Pacheco, and H. Nistazakis, “A Two-Parameter Modified Logistic Map and Its Application to Random Bit Generation,” Symmetry (Basel)., vol. 12, no. 5, p. 829, May 2020, doi: 10.3390/sym12050829.

S. Benaissi, N. Chikouche, and R. Hamza, “A novel image encryption algorithm based on hybrid chaotic maps using a key image,” Optik (Stuttg)., vol. 272, no. November 2022, p. 170316, Feb. 2023, doi: 10.1016/j.ijleo.2022.170316.

V. M. Putrie, C. A. Sari, D. R. I. M. Setiadi, and E. H. Rachmawanto, “Super Encryption using Transposition-Hill Cipher for Digital Color Image,” in 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI), Nov. 2018, pp. 152–157. doi: 10.1109/ISRITI.2018.8864361.

A. Gaidash, A. Kozubov, S. Medvedeva, and G. Miroshnichenko, “The influence of signal polarization on quantum bit error rate for subcarrier wave quantum key distribution protocol,” Entropy, vol. 22, no. 12, pp. 1–10, 2020, doi: 10.3390/e22121393.

M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information. Cambridge University Press, 2012. doi: 10.1017/CBO9780511976667.

D. E. Sari, H. N. N. Muchsin, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, “Hybrid encryption technique using cyclic bit shift and RC4,” in 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2019, Nov. 2019, pp. 205–209. doi: 10.1109/ICITISEE48480.2019.9003848.

Downloads

Published

2023-12-20

How to Cite

Setiadi, D. R. I. M., & Akrom, M. (2023). Hybrid Quantum Key Distribution Protocol with Chaotic System for Securing Data Transmission. Journal of Computing Theories and Applications, 1(2), 188–200. https://doi.org/10.33633/jcta.v1i2.9547