Quantum Key Distribution via BB84 An Advanced Lab Experiment
نویسنده
چکیده
Electronic communication has become one of the main pillars of modern society and their ongoing boom requires the development of new methods and techniques to secure data transmission. This has been the goal since the onset of cryptography in ancient times. Cryptography may be defined as the art of writing (encryption) and deciphering (decryption) messages in code in order to ensure their confidentiality, authenticity, integrity, and non-repudiation. However, current cryptography implementations provide only conditional security, relying on limited computational and technological capabilities of the opponent. This advanced-lab experiment presents the scheme for performing cryptography with unconditional security, based on fundamental laws of physics. In chapter 2 cryptography basics will be introduced in order to understand the weakness of ”public key cryptography” – mostly used for authentication today, e.g. in internet protocols – and the solution quantum mechanics provides by using ”quantum key distribution” (QKD). The quantum approach will be detailed by describing the theory of ”BB84”, the most widely applied quantum communication protocol (named after Charles Bennett and Gilles Brassard). Chapter 3 will introduce the experimental setup that will be used during the lab course. Finally, chapter 4 contains some suggestions how to use the setup.
منابع مشابه
Security of Key Distribution and Complementarity in Quantum Mechanics
• Quantum key distribution (BB84 protocol) • The goal of security proof • A very short course of quantum mechanics • Proving the security of QKD via complementarity • Basic idea • Small imperfections • A prescription for proving the security • The security of the BB84 protocol • Merits in the complementarity approach
متن کاملFast and User-friendly Quantum Key Distribution
Some guidelines for the comparison of different quantum key distribution experiments are proposed. An improved « plug & play » interferometric system allowing fast key exchange is then introduced. Self-alignment and compensation of birefringence remain. Original electronics implementing the BB84 protocol and allowing user-friendly operation is presented. Key creation with 0.1 photon per pulse a...
متن کاملCoherent State Quantum Key Distribution Without Random Basis Switching
The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show this via the no-switching protocol which results in higher information rates and a simpler experimental setup. We propose an optimal eavesdropping ...
متن کاملComparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak’s three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak’s threestage protocol is provided that makes it possible to deal with man-in-the-middle attack.
متن کاملPractical quantum key distribution over a 48-km optical fiber network
The secure distribution of the secret random bit sequences known as “key” material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg’s uncertainty principle ensures that an adversary can neither successfully tap the key transmis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006