Implementation of Secure Key Distribution Based On Quantum Cryptography

被引:5
|
作者
Elboukhari, Mohamed [1 ]
Azizi, Abdelmalek [1 ]
Azizi, Mostafa [2 ]
机构
[1] Univ Mohamed Ist, FSO, Dept Math & Comp Sci, Oujda, Morocco
[2] Univ Mohamed Ist, ESTO, Dept Comp Engn, Oujda, Morocco
关键词
BB84; protocol; cryptography; quantum cryptography; RSA; security;
D O I
10.1109/MMCS.2009.5256673
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The two models of traditional cryptography (symmetric encryption and asymmetric encryption) are confronted, in addition to the difficulty in creating credible keys of encoding/decoding, to the problem of distributing keys with perfect security. We present in this article results of a simulation of successful eavesdropping when exchanging keys with RSA algorithm. A solution to this problem is proposed by quantum physics. In this case, the security of the exchanged keys is not based on algorithmic complexity but rather on the laws of the quantum physics. Many quantum protocols are elaborated to exchange keys with unconditionally security. We are interested here in simulation of the protocol BB84 which the security is unconditional due to Heisenberg's Uncertainty Principle.
引用
收藏
页码:361 / +
页数:2
相关论文
共 50 条
  • [41] A Secure Communication Network Infrastructure Based on Quantum Key Distribution Technology
    Tanizawa, Yoshimichi
    Takahashi, Ririka
    Sato, Hideaki
    Dixon, Alexander R.
    Kawamura, Shinichi
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (05) : 1054 - 1069
  • [42] Secure Architecture for Quantum Key Distribution Networks
    Huttner, Bruno
    [J]. 2024 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION, OFC, 2024,
  • [43] Secure quantum key distribution with an uncharacterized source
    Koashi, M
    Preskill, J
    [J]. PHYSICAL REVIEW LETTERS, 2003, 90 (05)
  • [44] Secure quantum key distribution with realistic devices
    Xu, Feihu
    Ma, Xiongfeng
    Zhang, Qiang
    Lo, Hoi-Kwong
    Pan, Jian-Wei
    [J]. REVIEWS OF MODERN PHYSICS, 2020, 92 (02)
  • [45] A Novel Secure Quantum Key Distribution Algorithm
    Aldhaheri, Abdulrahman
    Elleithy, Khaled
    Alshammari, Majid
    Ghunaim, Hussam
    [J]. 2014 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2014,
  • [46] Demonstration of provably secure quantum key distribution
    Dasari, Venkat R.
    Sadlier, Ronald J.
    Geerhart, Billy E.
    Humble, Travis S.
    [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES, 2018, 10652
  • [47] Secure quantum key distribution with an uncharacterized source
    Koashi, Masato
    Preskill, John
    [J]. 2003, American Physical Society (90)
  • [48] Simple and secure quantum key distribution with biphotons
    Bregman, I.
    Aharonov, D.
    Ben-Or, M.
    Eisenberg, H. S.
    [J]. PHYSICAL REVIEW A, 2008, 77 (05):
  • [49] Secure key distribution by swapping quantum entanglement
    Song, DG
    [J]. PHYSICAL REVIEW A, 2004, 69 (03): : 034301 - 1
  • [50] Quantum key distribution based on orthogonal states allows secure quantum bit commitment
    He, Guang Ping
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2011, 44 (44)