Practical Issues in Quantum Cryptography
نویسنده
چکیده
Practical Issues in Quantum Cryptography Feihu Xu Master of Applied Science Graduate Department of Electrical & Computer Engineering University of Toronto 2012 Cryptography plays a key role in our life ranging from computer passwords to electronic commerce to national military security. The most widely used modern encryption algorithm is the public-key algorithm. However, the security of all public-key algorithms relies on unproven computational assumptions. Hence, there is a potential loophole for a fast algorithm to compromise their security. Quantum cryptography or quantum key distribution (QKD), on the other hand, is an unbreakable encryption algorithm. In principle, QKD can provide unconditional security based on the fundamental laws of quantum physics. Unfortunately, real-life implementations of a QKD system may contain overlooked imperfections and thus violate the practical security of QKD. It is vital to explore these imperfections. In this thesis, I study two practical imperfections in quantum cryptography: i) Security loophole in QKD system because of imperfect quantum state preparation; ii) How to generate high-speed truly random numbers. i) Discovering security loophole in a commercial QKD system: One key assumption in QKD is that the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. I perform a proof-of-principle experiment to demonstrate a technically feasible quantum attack that exploits such a security loophole in a commercial QKD system. The attack I utilize is called phase-remapping attack. ii) Generating high-speed truly random numbers: An essential element in QKD is a quantum random number generator (QRNG), which can generate true randomness by exploiting the indeterminism of quantum mechanics. However, due to the difficulties of measuring quantum effects in real setups, most approaches to QRNG are limited in speed. Here, I propose and experimentally demonstrate an ultrafast QRNG at a rate over 6 Gb/s, which is based on the quantum phase fluctuations of a laser. Moreover, I consider a potential adversary who has partial knowledge of the raw data and discuss how one can rigorously remove such partial knowledge with post-processing.
منابع مشابه
Applicability of Quantum Cryptography for Securing Mobile Communication Networks
After 20 years of basic research, quantum cryptography has meanwhile led to first commercial products. Its progress has triggered high publicity and additional R&D funding. The aim of this paper is to evaluate the status of quantum cryptography regarding its practical applicability for securing (mobile) communication networks. With that aim in mind, the paper presents a survey of the state-of-t...
متن کاملFast and simple high-capacity quantum cryptography with error detection
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which lea...
متن کاملDesign of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملInvestigation of System Performance of Quantum Cryptography Key Distribution in Network Security
For the past decade progress in quantum cryptography changed the status of quantum key distribution (QKD) from laboratory to the practical innovation technology. Quantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. Quantum cryptography applies the uncertainty principle and the no-cloning theorem of qu...
متن کاملSecurity of Quantum Cryptography with Realistic Sources
The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011