DocumentCode :
3149399
Title :
Quantum network security
Author :
Ghonaimy, M.A.
Author_Institution :
Ain Shams Univ., Cairo, Egypt
fYear :
2009
fDate :
14-16 Dec. 2009
Abstract :
This talk gives a brief overview of how to use basic concepts of quantum mechanics to achieve unconditional network security. Quantum key distribution (QKD) is used for this purpose to enhance Vernam ciphers. A protocol used for QKD is the Bennett-Brassard (BB84) protocol, which uses 4 nonorthogonal quantum states. Ideally, it uses single photon generators and a quantum channel assisted by a classical channel to achieve secure key generation. Sometimes, for ease of implementation, weak coherent laser pulses are used instead of single photons. In this case, the protocol is vulnerable to photon number splitting (PNS) attack. In order to counter this attack, decoy state method could be used. A brief outline will be given for this approach. Other types of QKD use entangled photon states, and an example for such protocols will be briefly outlined. QKD has reached the commercial stage, and a number of companies that have available products and solutions will be listed.
Keywords :
quantum theory; security of data; Bennett-Brassard protocol; Vernam ciphers; decoy state method; photon number splitting attack; quantum key distribution; quantum mechanics; quantum network security; secure key generation; single photon generators; Biographies; Counting circuits; Information systems; Optical pulses; Protocols; Quantum mechanics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Engineering & Systems, 2009. ICCES 2009. International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-5842-4
Type :
conf
DOI :
10.1109/ICCES.2009.5383322
Filename :
5383322
Link To Document :
بازگشت