Quantum Key Distribution (qkd) protocols theo- retically propose a high-security level based on the advantages of quantum computing. This paper analyze the security level of one of the most well-known qkd protocols, B...
详细信息
The inception of quantum key distribution (qkd) empowered the communication networks with unconditional security because of the unique characteristics of quantum mechanics. Since qkd genesis, various protocols have be...
详细信息
ISBN:
(纸本)9781728146768
The inception of quantum key distribution (qkd) empowered the communication networks with unconditional security because of the unique characteristics of quantum mechanics. Since qkd genesis, various protocols have been proposed to augment the feasibility of its real-world implementation and to overcome the inherent vulnerabilities of communication channel. In the past several years' studies emphasize the significance of qkd in the field of secure communication, because it can counter critical attacks quite effectively. In this paper, we present in-depth security analysis of the notable qkd protocols which encompasses from their theoretical assertions to their practical implementation factors and simulation outcomes.
The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key dist...
详细信息
ISBN:
(纸本)9781538661635
The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (qkd) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, qkd have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the qkd protocols. Also, we present a little experiment of some qkd protocols that we discussed on this paper.
Quantum-augmented networks aim to use quantum phenomena to improve detection and protection against malicious actors in a classical communication network. This may include multiplexing quantum signals into classical f...
详细信息
ISBN:
(纸本)9781510670839;9781510670822
Quantum-augmented networks aim to use quantum phenomena to improve detection and protection against malicious actors in a classical communication network. This may include multiplexing quantum signals into classical fiber optical channels and incorporating purely quantum links alongside classical links in the network. In such hybrid networks, quantum protocols based on single photons become a bottleneck for transmission distances and data speeds, thereby reducing entire network performance. Furthermore, many of the security assumptions of the single-photon protocols do not hold up in practice because of the impossibility of manufacturing single-photon emitters. Multi-photon quantum protocols, on the other hand, are designed to operate under practical assumptions and do not require single photon emitters. As a result, they provide higher levels of security guarantees and longer transmission distances. However, the effect of channel and device noise on multiphoton protocols in terms of security, transmission distances, and bit rates has not been investigated. In this paper, we focus on channel noise and present our observations on the effect of various types of noise on multi-photon protocols. We also investigate the effect of topologies such as ring, star, and torus on the noise characteristics of the multi-photon protocols. Our results show the possible advantages of switching to multi-photon protocols and give insights into the repeater placement and topology choice for quantum-augmented networks.
Quantum key distribution (qkd) systems enable secure key generation between two parties. Such systems require an authenticated classical channel for qkd protocols to work. Usually, the initial authentication key for t...
详细信息
Quantum key distribution (qkd) systems enable secure key generation between two parties. Such systems require an authenticated classical channel for qkd protocols to work. Usually, the initial authentication key for this channel is pre-shared. In this work, methods that are used to renew the pre-shared keys ensuring a high level of security and performance for the subsequent quantum key generation are discussed. The model of qkd systems in terms of the lifecycle of the keys is formalised and a full set of parameters that can be used for key renewal functions is described. A detailed adversary model allows us to compare key renewal schemes by the probabilities of successful attacks and their consequences. As a result, it is shown that a hybrid key renewal scheme, which uses both the auxiliary pre-shared key and a part of the quantum sequence, has the higher security properties among considered schemes and is recommended to be used in qkd systems.
Quantum key distribution is the latest advancement in quantum cryptography. There are several qkd protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the second protocol developed in 1992 based on...
详细信息
Quantum key distribution is the latest advancement in quantum cryptography. There are several qkd protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the second protocol developed in 1992 based on Heisenberg's uncertainty principle. In this paper we are discussing first about the related work for the simulation of qkd protocols, second the simulation of B92 and proposed protocol is elaborated and then we compare the performance of B92 with the proposed protocol and proving proposed protocol much better in case of average key length and error rate. Object-oriented approach is used in the simulation designing of new protocol and B92 protocol.
Quantum key distribution is the latest advancement in quantum cryptography. There are several qkd protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the Second protocol developed in 1992 based on...
详细信息
Quantum key distribution is the latest advancement in quantum cryptography. There are several qkd protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the Second protocol developed in 1992 based on Heisenberg's Uncertainty Principle. In this paper we are discussing first about the working of B92 protocol and then proposing a new protocol which is a variation over B92 protocol, second the design of simulation setup is discussed. Object oriented approach is used in the simulation designing of new protocol and B92 protocol.
暂无评论