Investigation of System Performance of Quantum Cryptography Key Distribution in Network Security

نویسنده

  • Mehrdad Sepehri Sharbaf
چکیده

For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. Quantum cryptography applies the uncertainty principle and the no-cloning theorem of quantum mechanics to provide ultra-secure encryption key distribution between two parties. Conventional secret-key cryptography techniques require the communication of a secret key prior to message exchange, and does not detect eavesdropping, and quantum principles can be used to detect eavesdropping probabilistically when it occurs. But there are challenges, and limitations to implement practical quantum cryptography such as detector performance for measuring photons, or optical sources which, enforce by the state-ofthe-art components crucial for the system performance of quantum cryptography, and fiber optical distance range affect the system performance of quantum cryptography For that reason, the goal of this research is to investigate the system performance of quantum cryptography key distribution in network security, and this investigation develops a theoretical integrated research model or conceptual model framework concerning (figure 4) parameters which affect QKD system performance, and generates a key that affects by those variables. To support the research the experimental data are performed, collected, and analyzed at MagiQ Technology in the Research & Development Lab. The rate of cryptography key or sifted key rate and the quantum bit error rate (QBER) are used to gauge the performance. The research presents a guideline to improve the system performance of the quantum cryptography. Keywords-component; Quantum Crytography, QKD System Performance; System Conceptual Model;

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

United Nations Educational Scientific and Cultural Organization and International Atomic Energy Agency THE ABDUS SALAM INTERNATIONAL CENTRE FOR THEORETICAL PHYSICS APPLICATION OF AVK AND SELECTIVE ENCRYPTION IN IMPROVING PERFORMANCE OF QUANTUM CRYPTOGRAPHY AND NETWORKS

The subject of quantum cryptography has emerged as an important area of research. Reported theoretical and practical investigations have conclusively established the reliable quantum key distribution (QKD) protocols with a higher level of security. For perfect security, the implementation of a time variant key is essential. The nature of cost and operation involved in quantum key distribution t...

متن کامل

On the transmission capacity of quantum networks

We provide various results about the transmission capacity of quantum networks. Our primary focus is on algorithmic methods to efficiently compute upper-bounds to the traffic that the network can handle at most, and to compute lower-bounds on the likelihood that a customer has to wait for service due to network congestion. This establishes analogous assertions as derived from Erlang B or Erlang...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Architecture and protocols of the future European quantum key distribution network

A point-to-point quantum key distribution (QKD) system takes advantage of the laws of quantum physics to establish secret keys between two communicating parties. Compared to the classical methods, such as public-key infrastructures, QKD offers unconditional security, which makes it attractive for very high security applications. However, this unprecedent level of security is mitigated by the in...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013