TY - GEN
T1 - A 32-bit Quantum Encryption Algorithm Using Dynamic Pauli Gates
AU - Elbaset, Mohamed A.
AU - Soliman, Mohamed A.
AU - Deraz, Shady A.
AU - Moussa, Karim H.
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023/10
Y1 - 2023/10
N2 - By utilizing quantum cryptography, a real-time secure algorithm is created that makes use of the quantum properties of photons. An algorithm utilizing symmetric key is presented, taking into account the fundamental principles of both classical and quantum computing. Messages in this algorithm consist of blocks, each of which consists of 32 bits of space. To begin with, the process of classical encryption is divided into two processes, rotation process and permutation process, all controlled by the key that determines the order in which the bits of the block message are rotated. Secondly, encrypting block messages in bits is converted to qubits. In the third step, the quantum bits are applied to a certain quantum gate, such as Not(x), Control Not (CNot) and Toffoli (T), to change the value of that quantum bits. Fourth, in order to create non-orthogonal ciphertext states, Pauli gates are utilized and controlled by a key in the second stage. Eavesdroppers cannot detect the encryption of messages that have changed from orthogonal states to non-orthogonal states because quantum computing is based on quantum mechanical principles. It has been demonstrated that the proposed algorithm increases message space. In addition, various algorithm analyses have proven the improved strength of our proposed algorithm against various attacks, including brute force attacks.
AB - By utilizing quantum cryptography, a real-time secure algorithm is created that makes use of the quantum properties of photons. An algorithm utilizing symmetric key is presented, taking into account the fundamental principles of both classical and quantum computing. Messages in this algorithm consist of blocks, each of which consists of 32 bits of space. To begin with, the process of classical encryption is divided into two processes, rotation process and permutation process, all controlled by the key that determines the order in which the bits of the block message are rotated. Secondly, encrypting block messages in bits is converted to qubits. In the third step, the quantum bits are applied to a certain quantum gate, such as Not(x), Control Not (CNot) and Toffoli (T), to change the value of that quantum bits. Fourth, in order to create non-orthogonal ciphertext states, Pauli gates are utilized and controlled by a key in the second stage. Eavesdroppers cannot detect the encryption of messages that have changed from orthogonal states to non-orthogonal states because quantum computing is based on quantum mechanical principles. It has been demonstrated that the proposed algorithm increases message space. In addition, various algorithm analyses have proven the improved strength of our proposed algorithm against various attacks, including brute force attacks.
KW - Pauli gates
KW - Quantum Bits
KW - Quantum computing
KW - Quantum Cryptography
KW - Quantum Gates
KW - Toffoli Gate
KW - Trojan Horse Attack
UR - http://www.scopus.com/inward/record.url?scp=85169297052&partnerID=8YFLogxK
U2 - 10.1109/ITC-Egypt58155.2023.10206366
DO - 10.1109/ITC-Egypt58155.2023.10206366
M3 - Conference Proceeding
AN - SCOPUS:85169297052
T3 - 2023 International Telecommunications Conference, ITC-Egypt 2023
SP - 423
EP - 428
BT - 2023 International Telecommunications Conference, ITC-Egypt 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2023 International Telecommunications Conference, ITC-Egypt 2023
Y2 - 18 July 2023 through 20 July 2023
ER -