Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
QUANTUM COMPUTING-BASED ENCRYPTION ALGORITHM
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 9 November 2024
Abstract
The present invention relates to a quantum computing-based encryption algorithm designed to secure data against both classical and quantum computational attacks. The method utilizes quantum key distribution (QKD) for secure key generation, leveraging quantum mechanical principles such as superposition and entanglement to encrypt data. In particular, quantum entanglement and quantum gates are applied to manipulate qubits for data encryption, ensuring that any unauthorized interception or measurement results in a detectable disturbance, preventing decryption without the correct key. The system is further enhanced by a post-quantum cryptographic layer, providing an additional layer of security compatible with both quantum and classical cryptographic methods. This hybrid approach ensures that sensitive data remains protected in the transition from classical to quantum computing environments, making it resistant to future quantum decryption methods.
Patent Information
Application ID | 202441086522 |
Invention Field | COMMUNICATION |
Date of Application | 09/11/2024 |
Publication Number | 46/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
Mrs. B. Uma Maheswari | Assistant Professor, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Karingali Sai Praveen Kumar | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Koppala Sudheer | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Muppe Reddeppa | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Nagamuntala Masthan | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Nanubala Mamatha | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Payyavula Bhanu Mukesh | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Raja Arjun | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Shaik Khaja Fairoj | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Syed Irfan | Final Year B.Tech Student, Department of Computer Science & Engineering, Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist., Andhra Pradesh, India-524101, India. | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
Audisankara College of Engineering & Technology | Audisankara College of Engineering & Technology, NH-16, By-Pass Road, Gudur, Tirupati Dist, Andhra Pradesh, India-524101, India. | India | India |
Specification
Description:The embodiments of the present invention generally relates to cryptographic methods and systems, specifically to a quantum computing-based encryption algorithm designed to provide secure data transmission and storage. The invention utilizes the unique properties of quantum mechanics, such as superposition, entanglement, and quantum key distribution (QKD), to enhance data security and ensure resistance against quantum-enabled decryption methods, ensuring long-term protection for sensitive information in a post-quantum world.
BACKGROUND OF THE INVENTION
The following description of related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
With the advent of quantum compu , Claims:1. A method for encrypting data using quantum computing, comprising:
generating a quantum key using quantum key distribution (QKD) by transmitting quantum bits (qubits) between a sender and a receiver, wherein the qubits are encoded in quantum states and measured by the receiver to establish a secure key;
applying quantum entanglement to encrypt the data by generating entangled pairs of qubits, encoding the data onto the qubits, and manipulating the qubits using quantum gates to create an encrypted message;
transmitting the encrypted data through a communication channel; and
ensuring that any interception or measurement of the encrypted data by an adversary results in a detectable disturbance in the quantum states, preventing unauthorized decryption without the correct key.
2. The method of claim 1, wherein the quantum key generation step uses the BB84 protocol for quantum key distribution to securely exchange the encryption key between the sender and the receiver.
3. The method of claim 1, wherein the quan
Documents
Name | Date |
---|---|
202441086522-COMPLETE SPECIFICATION [09-11-2024(online)].pdf | 09/11/2024 |
202441086522-DECLARATION OF INVENTORSHIP (FORM 5) [09-11-2024(online)].pdf | 09/11/2024 |
202441086522-DRAWINGS [09-11-2024(online)].pdf | 09/11/2024 |
202441086522-FORM 1 [09-11-2024(online)].pdf | 09/11/2024 |
202441086522-FORM-9 [09-11-2024(online)].pdf | 09/11/2024 |
202441086522-REQUEST FOR EARLY PUBLICATION(FORM-9) [09-11-2024(online)].pdf | 09/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.