Centralized Key Distribution Using Quantum Cryptography
نویسنده
چکیده
The current data protection mechanism that typically comprises of cryptographic systems relies on the computational hardness as a means to protect sensitive data. With the recent advancements in quantum computing, quantum computers pose a serious challenge to such cryptographic systems. Interest in quantum cryptography has been stimulated by the fact that quantum algorithms like Shor’s algorithm for integer factorization and discreet logarithms threatens the security of classical cryptosystems. Quantum Cryptography or Quantum Key distribution provides ultimate security assurance over a optical fiber communication link by resisting interception and retransmission by an eavesdropper between two communicating parties. Based on the foundations of quantum mechanics, the goal of quantum cryptography is to thwart attempts by third party to gain knowledge of the key. The third party trying to eavesdrop on the keys must in some way measure it and thus introducing detectable anomalies. This paper focuses on quantum cryptography and how this technology can be used for secure key distribution in both centralized and decentralized network, along with its limitations. Keywords— Quantum key distribution, decentralized network, centralized network, cryptography, symmetric encryption
منابع مشابه
Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication
It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that ...
متن کاملSECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...
متن کاملFree-Space Optical Quantum Key Distribution Using Intersatellite Links
Communication schemes employing quantum entanglement open a wide field of possible applications with properties outperforming their classical counterparts. Promising examples are quantum key distribution, quantum dense coding, and quantum state teleportation. We investigate the potential of quantum cryptography, i.e. quantum key distribution (QKD), with special emphasis on the demands and oppor...
متن کاملLimitations of Practical Quantum Cryptography
As we all know that the quantum cryptography is having lots of consideration in present time for security but it’s important to note that implementation of algorithms using QC is not viable if one wants to have the security intact. It can only be used to share keys using Quantum Key Distribution (QKD). Distribution of keys is just a part of securing information. Proper encryption and decryption...
متن کاملAn Efficient Tree-Based Group Key Agreement Using Bilinear Map
Secure and reliable group communication is an increasingly active research area by growing popularity in group-oriented and collaborative application. One of the important challenges is to design secure and efficient group key management. While centralized management is often appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017