Cryptographic protocols in optical communication
نویسنده
چکیده
Quantum key distribution (QKD) is a technique that allows two parties (Alice and Bob) to generate a secret key despite the computational and technological power of an eavesdropper (Eve) who interferes with the signals. Together with the Vernam cipher, QKD can be used for unconditionally secure data transmission. In a typical realization of QKD one can distinguish two phases in order to generate a secret key. In the first phase, an effective bipartite quantum mechanical state is distributed between Alice and Bob. This state creates correlations between them and it might contain as well hidden correlations with Eve. Next, a (restricted) set of measurements is used by the legitimate users to measure these correlations. As a result, Alice and Bob obtain a classical joint probability distribution P r(A, B) representing their measurement results. In the second phase, Alice and Bob use an authenticated public channel to process P r(A, B) in order to obtain a secret key. This procedure involves, typically, classical post-processing techniques such as post-selection of data, error correction to reconcile the data, and privacy amplification to decouple the data from Eve. An essential question in QKD is to determinate which kind of correlated data P r(A, B), generated in the first phase, enables Alice and Bob to extract a secret key at all from it during the second phase of the protocol. Security proofs for QKD usually fix Alice's and Bob's signal states and measurement devices and impose, additionally, the use of a particular classical communication protocol during the second phase of QKD. As a result, the obtained proofs can show certain achievable secret key rates as a function of the distance. These security proofs, however, leave open the possibility that the development of better proof techniques, or better classical post-processing protocols for the second phase of the QKD protocol, might lead to an increase of the covered distance and rate for a given P r(A, B). In this thesis we search for ultimate upper bounds on QKD based exclusively on the classical correlations P r(A, B) and on the knowledge of Alice's and Bob's physical devices, and not on the particular classical post-processing techniques used by the legitimate users during the second phase of QKD. In particular, we show that a necessary precondition for successful QKD is that sender and receiver can prove the presence of entanglement in the effective bipartite quantum state that is distributed …
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملModelling Attacker's Knowledge for Cascade Cryptographic Protocols
We address the proof-based development of cryptographic protocols satisfying security properties. Communication channels are supposed to be unsafe. Analysing cryptographic protocols requires precise modelling of the attacker’s knowledge. In this paper we use the event B modelling language to model the knowledge of the attacker for a class of cryptographic protocols called cascade protocols. The...
متن کاملSecurity Agility Solution Independent of the Underlaying Protocol Architecture
Cryptographic protocols are constantly exposed to new attack methods. When some cryptographic protocol gets exposed there is a need to replace it. This is hard because most cryptographic protocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used. In that way old and vulnerable protocols could be easily replaced with new ones. The ag...
متن کاملFramework for reasoning about cryptographic protocols with randomization
Context. Cryptographic protocols are distributed programs which use cryptographic primitives to secure communication over untrusted networks (such as the Internet). They are designed to achieve security properties such as confidentiality, authentication or anonymity. Due to the complexity of cryptographic primitives, the inherent concurrency and the untrusted nature of networks, their design ha...
متن کاملQuantum cryptography for multi - user passive optical networks
Quantum cryptography has been shown to be an effective technique for the secure distribution of cryptographic keys on point-to-point communication links. Here, we describe adaptations of the existing quantum cryptography protocols and equipment configurations that allow secure key distribution to be performed on a variety of multiuser passive optical network (PON) architectures. These adaptatio...
متن کامل