WOW !! MUCH LOVE ! SO WORLD PEACE !
Fond bitcoin pour l'amélioration du site: 1memzGeKS7CB3ECNkzSn2qHwxU6NZoJ8o
  Dogecoin (tips/pourboires): DCLoo9Dd4qECqpMLurdgGnaoqbftj16Nvp


Home | Publier un mémoire | Une page au hasard

 > 

Quantum key distribution theory and practice

( Télécharger le fichier original )
par Grace Mupoyi
African Institut for Mathematical Science - Master 2 2015
  

précédent sommaire

Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy

CONCLUSION

The combination of quantum mechanic with cryptography has given rise to a new field which is quantum cryptography. In this project, we started by introducing the basic cryptographic notions, namely encryption/decryption, one type of cryptosystems and Diffie-Hellmann Key-Exchange.

As this field make a jonction with physics, in our second part, we studied some notions related to quantum mechanics as polarization, Heisenberg Uncertainty Principle, quantum entanglement and the no-cloning theorem where we explained the use of those notions. The notions developed in the second section of this project, are the basic and important one to understand physics notions used in quantum cryptography and those notions allow us to introduce a Quantum Key Distribution Protocols (QKD), QKD as a main element in quantum cryptography, follow by Quantum Key Distribution implementation technologies. We also gave some examples and come up with the last point related to Quantum key Distribution applications.

Indeed, we reach our last point by taking one example of application SECOQC which is a quantum network. In this application, BBN Technolgy with Havard University and others groups developed new protocols for quantum area in the F6 project. The protocols was developped in OSI model, using the composition of the model, the researchers added a new componant in the classical protocols acting with specific layers. As in session layer, they added a QKD in TLS/SSL and the combination give the QSSL protocol again they added in network layer, they combine two protocols nammed IPSEC plus QKD and they found a new protocol called SEQKEIP. The last one is data link where they found other name like Q3P, which is the composition of QKD with a protocol Point-to-point protocol. This is one of the applications of quantum cryptography. All the applications and technologies are possible by the way of single photon and single detector. The only way they are used for transmitting information through quantum network is an optical fiber.

2

Acknowledgements

I express my sincere thanks to the AIMS-NEI and AIMS-Senegal family, for funding, providing me with an opportunity to study and all the necessary facilities for completion of my work in good condition.

I place on record, sincere gratitude to my supervisor Dr. Kassem Kalach, from Institue for Quantum Computing. I am extremely thankful and indebted to him for his expertise, sincere and valuable guidance extended to me.

Big thanks to my father Jean Kanyinda Bidiku and mother Jeanne Ngomba Bitota for helping and supporting me since i was borned till now. Thanks to my sisters Lydie Gambwalemba Galubadi-a-Lemba, Fidele Kapinga Kalonji, Ruth Muambi Kanyinda, Esther Mbombo Kanyinda, Dorcas Ngomba Kanyinda.

I thanks my tutor Miss. Bernadette Faye for her help, constructive criticism, encouragement and support during my essay phase.

I also thank my colleagues and all tutors, one and all, who directly or indirectly, have lent their hand in this venture.

3

References

[AD11] Atsushi Yabushita and Department of Electrophy, Schemes to generate entangled photon

pairs via spontaneous parametric down conversion, May 2011.

[Bar05] Franck Barbier, UML 2 et MDE: ingnierie des modles avec tudes de cas, Dunod, Paris, 2005

(French).

[BHL07] Paul Busch, Teiko Heinonen, and Pekka Lahti, Heisenberg's uncertainty principle, Physics

Reports 452 (2007), no. 6, 155-176.

[EAA] Mohamed Elboukhari, Abdelmalek Azizi, and Mostafa Azizi, Integration of Quantum Cryp-

tography in the TLS Protocol: Reality and Perspectives, MICS 10, 2-4.

[GG08] Joseph Gabay and David Gabay, UML 2 analyse et conception: mise en oeuvre guide avec

tudes de cas, 2008.

[Hai14] Mart Haitjema, A survey of the prominent quantum key distribution protocols, URL:

http://www. cse. wustl. edu/ jain/cse571-07/ftp/quantum ( 18.10. 2013), 2014.

[KDB+] E. Karpov, T. Durt, F. Vanden Berge, N. J. Cerf, and T. dHondt, Cryptographie quantique,

White paper, 10.

[KR02] Ralph Kimball and Margy Ross, The data warehouse toolkit: the complete guide to dimen-

sional modeling, 2nd ed ed., Wiley, New York, 2002.

[KX] Muhammad Mubashir Khan and Jie Xu, Applications of QKD Network for High Performance

Distributed Computing.

[Mer07] N. David Mermin, Quantum computer science an introduction, Cambridge University Press,

Cambridge, 2007 (English).

[MVOV96] Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone, Handbook of applied cryptography, CRC press, 1996.

[NAZ02] Olaf Nairz, Markus Arndt, and Anton Zeilinger, Experimental verification of the Heisenberg uncertainty principle for fullerene molecules, Physical Review A 65 (2002), no. 3 (en).

[NC10] Michael A. Nielsen and Isaac L. Chuang, Quantum computation and quantum information,

10th anniversary ed ed., Cambridge University Press, Cambridge ; New York, 2010.

[QQL10a] Bing Qi, Li Qian, and Hoi-Kwong Lo, A brief introduction of quantum cryptography for engineers, arXiv preprint arXiv:1002.1237 (2010).

[QQL10b] , A brief introduction of quantum cryptography for engineers, arXiv preprint

arXiv:1002.1237 (2010).

[Sar] Debasis Sarkar, Quantum Entanglement- Fundamental Aspects.

[Sar14] Mohan Sarovar, Introduction to quantum key distribution, October 2014.

[Sca09] Valerio Scarani, Quantum information: primitive notions and quantum correlations, arXiv

preprint arXiv:0910.4222 (2009).

REFERENCES Page 4

[SML10] Douglas Stebila, Michele Mosca, and Norbert Ltkenhaus, The case for quantum key distri-

bution, Quantum Communication and Quantum Networking, Springer, 2010, pp. 283-296.

[SRS12] Peter Schartner, Stefan Rass, and Martin Schaffer, Quantum Key Management, APPLIED

CRYPTOGRAPHY AND NETWORK SECURITY, 2012, p. 227.

[SSL09] Douglas Stebila, Douglas Stebila, and Norbert Ltkenhaus, The Case for Quantum Key

Distribution, 12.

[STH] M. A. Sfaxi, I. Tashi, and S. Ghernaouti Hlie, How QKD can improve the security level of

future e-commerce transaction, Proc. 18th European Regional International Telecommunication Society Conf.(ITS2007), Citeseer, pp. 1-12.

[STI06] Douglas R. STINSON, Cryptography theory and practice third edition, chapman & Hall

/CRC, Taylor & Francis Group, 2006 (English).

[Tan13] Xiaoqing Tan, Introduction to Quantum Cryptography, Theory and Practice of Cryptography

and Network Security Protocols and Technologies (Jaydip Sen, ed.), InTech, July 2013, p. 1 (en).

[VA06a] Gilles Van Assche, Quantum cryptography and secret-key distillation, Cambridge University

Press, Cambridge ; New York, 2006.

[VA06b] , Quantum cryptography and secret-key distillation, Cambridge University Press,

2006.

[Zha09] Yi Zhao, Quantum cryptography in real-life applications: assumptions and security, Ph.D.

thesis, University of Toronto, 2009.

précédent sommaire






Bitcoin is a swarm of cyber hornets serving the goddess of wisdom, feeding on the fire of truth, exponentially growing ever smarter, faster, and stronger behind a wall of encrypted energy








"Il y a des temps ou l'on doit dispenser son mépris qu'avec économie à cause du grand nombre de nécessiteux"   Chateaubriand