Secure Communication using Quantum Computing Method

—Quantum computing is the use of quantum-mechanical phenomena such as superposition and entanglement to perform computation. To say a better communication parameters like security, high data rate etc., are important. The paper aims to make the communication more secure by exploring the quantum mechanical phenomena. In our demonstration we have considered the public channel and quantum channel. Public channel uses the classical communication techniques whereas for the quantum channel keys are exchanged using quantum computing methods. The continuous key exchange protocol is implemented using IBM Quantum experience.


INTRODUCTION
In today's world, computers are ubiquitous. They can be found in virtually any industry and most households own at least one personal computer or have a mobile phone. What truly transformed our society are large scale networks, like the Internet or mobile telephone networks, which can link billions of devices. Our ways of communicating and conducting business have severely changed over the last decades due to this development. However, most of this communication happens over inherently insecure channels requiring methods to protect our communication. A further issue is the vast amount of data generated, which raises serious privacy concerns. Cryptography provides the key components for protecting our communication. It also secures the passwords and personal data from eavesdroppers. To get a safe strategy to share data between the gatherings is accomplished by the encryption of the information utilizing quantum mechanics standards. Quantum cryptographic actualizes another procedure of cryptanalysis which makes it inconceivable for outsider elements to get these keys. Keys produced between different sides utilizing quantum channels called quantum key conveyances. Quantum key conveyance (QKD) is the principal quantum data undertaking to arrive at the degree of develop innovation. It focuses on the production of a mystery key between approved accomplices associated by a quantum channel. QKD is the way toward utilizing quantum correspondence to build up a mutual key between two gatherings without an outsider (Eve) getting the hang of anything about that key, regardless of whether Eve can listen stealthily on all correspondence between the clients.. In the event that Eve attempts to learn data about the key being set up, errors will emerge making the client notice.
When the key is set up, it is then commonly utilized for encoded correspondence utilizing traditional procedures.

II. LITERATURESURVEY
Visible Light Communication (VLC) [1] can be succinctly expressed as Data Transmission through Illumination. Information transmission through noticeable light correspondence is significantly more secure and is fit for accomplishing high information transmission rates when contrasted with existing traditional remote innovations like Wi-Fi, Bluetooth, Wi-max, and so forth, which uses radio recurrence range. Here creator [31] targets assembling a remote VLC framework fit for transmitting content information between two PCs utilizing obvious light. A Light Emitting Diode (LED) is utilized as the transmitter, air as the transmission medium, and a Light emitting Resistor (LER) as the accepting part. Content information gets transmitted as series of 1s and 0s as the LED flashes on and off, quickly at a rate imperceptible to the natural eye. With the quick advancement of the innovation of optical correspondence [2], the security in it has pulled in an ever increasing number of individuals' consideration and even has become a basic segment of national security. Contrasted and the conventional media transmission, optical correspondence is viewed as a sort of secure correspondence on the grounds that optical fiber, transmission vehicle of it, is invulnerable to the average issues of electromagnetic obstruction EMI v/s radiorecurrence impedance (RFI). In any case, the fundamental qualities of the optical fiber make it powerless against an assortment of assaults, including physical framework assaults, listening in, capture attempt, and sticking. The creator proposes another model to infuse the light into a correspondence fiber without harming the cladding or center of it. From the numerical count, the intensity of the infused optical sign can arrive at over 20% of the info power. This degree of infused signal is adequate to meddle with the sign moved in the correspondence. Along these lines, measures to battle this sort of induction and misdirection ought to be taken. In this paper, to meddle with the sign in fiber, a technique for radiation field coupling is proposed. Contrasted and the strategies referenced above aside from fiber twisted, this strategy doesn't harm the center or cladding of correspondence fiber that can guarantee this sort of assault not found. To depict this strategy, right off the bat, a point by point hypothetically examination of the best approach to infuse  [4] has been a worldwide system where articles are connected together so that they can share information among themselves so they interface right away. So also, Ubiquitous processing is the rising pattern of embedding computational capacity into regular items to make them effectively impart to achieve helpful assignments. The advancement of these advances prompts an exponential development of brilliant sensors and gadgets which require quicker, secure, vitality effective information transmission.

a) H Gate
The H or Hadamard gate pivots the states |0> and |1> to |+> and |->, individually. It is valuable for making superposition. As a Clifford door, it is helpful for moving data between the x and z bases.
Matrix form: H=

b) cX Gate
The controlled-X entryway is otherwise called the controlled-NOT. It follows up on a couple of qubits; with one is going about as 'control' and the different as 'target'. It plays out a X on the objective at whatever point the control is in state |1>. In the event that the control qubit is in a superposition, this gate creates entanglement.

c) X Gate
The Pauli X gate has the property of flipping |0> the state to |1>, and vice versa. It is equivalent to Rx for the angle .
Matrix form: The Pauli Y gate is equivalent to Ry for the angle . It is also equivalent to the combined effect of X and Z.

e) Z Gate
The Pauli Z gate has the property of flipping the |+> to|->, and vice versa. It is equivalent to Rz for the angle .

f) Swap Gate
The SWAP gate simply swaps the states of two qubits.   RESULT Quantum computing and its quantum mechanical phenomena like entanglement offers a new modality for communications that is different from classical communications. The motivation for use of quantum entanglement (EPR pairs and Bell states) its flexibility and security even though some of the quantum entanglement protocols are non-intuitive. It seems clear that traditional/classical communications engineers will need to develop a new way of thinking that moves them away from classical intuition in order to take advantage of the entanglement resource inbuilding advanced communication systems.