A new approach to provide a secure connection between internetbrowsers and website allowing people to transmit private data online, by integrating quantum cryptography in TLS protocol is introduced.
For ages,mathematicians have searched for a system that would allow two people to exchangemessages in perfect privacy.Quantum cryptography wins to make data secure using fundamentalphysical principles such Heisenbers uncertainty principle and cloning theorem.probably its bestknown application today is quantum key distribution ,which allow two parties to protect theirsecret communication from prying eyes of an evesdropper.Transport layer security is designedto provide communication security over the internet.TLS use X.509 certi_cates and hence asymmetric cryptography to authenticate the counterparty with when they are communicating andto exchange a symmetric key.In this paper,I introduce new approach to provide a secure connection between internetbrowsers and website allowing people to transmit private data online,by integrating quantumcryptography in TLS protocol.Quantum cryptography technologies both securely authenticateclients and servers and exchange trade secret symmetric key and provide secure communication Keywords—Quantum key distribution,TLS I.INTRODUCTION Cryptography is the art of the principles and method of transforming an intelligible,and then retransforming that message back to its original form.Cryptography is an essential part of today’s information systems.Quantum cryptography is recent technique ,that can be used to ensure the confidentiality of information transmitted between two parties.Using laws of quantum mechanics such as Heisenberg uncertainty principle and cloning theorem .Quantum mechanics fundamentally change the way we must see our world.At atomic scales,elementary particles do not have precise location or speed as we would intuitively expect.According to Heisenberg uncertainty principle we can’t measure position and angular momentum of a particle simultaneously.In quantum cryptography both sender and receiver having polarizers.Using light emitting source sender sends photon to receiver .If both both sender and receiver use the same polarizer ,then we select that bit value as a one bit of the key. Internet banking have very important role in our day to day life.TLS,(Transport Layer Protocol)or SSL(Secure Socket Layer) are based on public key cryptography. In the authentication process,aTLS/SSL client sends a message to a TLS/SSL server and sever responds with the information that the server needs toauthenticate itself.The client andserver perform an additional exchanges of session keys and authenticationdilogues ends.When authentication completes SSL-communication can begin between the server and client using symmetric keys ,that established during authentication process.In TLS generate a session key by using RSA.So instead of RSA ,we can integrate quantum cryptography in TLS inoder to increase the security. II.QUANTUMCRYPTOGRAPHY(BB84 PROTOCOL) Using cryptography, we can keep private information from unautherized access of ensuring data integrity and authentication and other taskes.There are various type of classical cryptography. In ceaercipher,key followed is every letter is replaced by third letter.So it is easy to understand the evesdroppernad easy break the code.In classical cryptography permutation s and substitution techniques are used.Soot is easy for eves to break the code.There are two type of cryptographic algorithm.Symmetric key nad public key algorithm.In symmetric key algorithm,one key is shared by both sender and receiver and used for both encryption and decryption.Inassymetric key algorithm or pubic key algorithm use two keys.One is public key ,used in public and private key is known only to individual user. In Quantumcryptography ,there are two channel,optical channel and public channel.Optical channel is used for transferring photons between sender and receiver. Public channels used for discussing about which polarizer is both sender and receiver used.In quantum cryptography ,it ensure secure communication between two parties across optical network.Both sender and receiver two polarizers and light emitting source.There are two polarizer,vertical polarizer and diagonal polarizer.At the sender side light emitted from light emitting source will passed through one of the polarizer,either through vertical polarizer or through diagonal polarizer across optical netwok.Light waves are propagated as discrete quanta called,photons.They are massless and have energy,momentum and angular momentum called spins.Spin carries the polarizeration photon may or may not pass through he polarizer using a detector to check whether the photon polarized or not.At receiver side also having polarizer and it polarize the photon.If the sender and receiver using the same polarizer,then match occurred and that bit value become one of the bit of the key. Lavannya Varghese et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 14-17