CONCLUSION
The combination of quantum mechanic with cryptography has
given rise to a new field which is quantum cryptography. In this project, we
started by introducing the basic cryptographic notions, namely
encryption/decryption, one type of cryptosystems and Diffie-Hellmann
Key-Exchange.
As this field make a jonction with physics, in our second
part, we studied some notions related to quantum mechanics as polarization,
Heisenberg Uncertainty Principle, quantum entanglement and the no-cloning
theorem where we explained the use of those notions. The notions developed in
the second section of this project, are the basic and important one to
understand physics notions used in quantum cryptography and those notions allow
us to introduce a Quantum Key Distribution Protocols (QKD), QKD as a main
element in quantum cryptography, follow by Quantum Key Distribution
implementation technologies. We also gave some examples and come up with the
last point related to Quantum key Distribution applications.
Indeed, we reach our last point by taking one example of
application SECOQC which is a quantum network. In this application, BBN
Technolgy with Havard University and others groups developed new protocols for
quantum area in the F6 project. The protocols was developped in OSI model,
using the composition of the model, the researchers added a new componant in
the classical protocols acting with specific layers. As in session layer, they
added a QKD in TLS/SSL and the combination give the QSSL protocol again they
added in network layer, they combine two protocols nammed IPSEC plus QKD and
they found a new protocol called SEQKEIP. The last one is data link where they
found other name like Q3P, which is the composition of QKD with a protocol
Point-to-point protocol. This is one of the applications of quantum
cryptography. All the applications and technologies are possible by the way of
single photon and single detector. The only way they are used for transmitting
information through quantum network is an optical fiber.
2
Acknowledgements
I express my sincere thanks to the AIMS-NEI and AIMS-Senegal
family, for funding, providing me with an opportunity to study and all the
necessary facilities for completion of my work in good condition.
I place on record, sincere gratitude to my supervisor Dr.
Kassem Kalach, from Institue for Quantum Computing. I am extremely thankful and
indebted to him for his expertise, sincere and valuable guidance extended to
me.
Big thanks to my father Jean Kanyinda Bidiku and mother Jeanne
Ngomba Bitota for helping and supporting me since i was borned till now. Thanks
to my sisters Lydie Gambwalemba Galubadi-a-Lemba, Fidele Kapinga Kalonji, Ruth
Muambi Kanyinda, Esther Mbombo Kanyinda, Dorcas Ngomba Kanyinda.
I thanks my tutor Miss. Bernadette Faye for her help,
constructive criticism, encouragement and support during my essay phase.
I also thank my colleagues and all tutors, one and all, who
directly or indirectly, have lent their hand in this venture.
3
References
[AD11] Atsushi Yabushita and Department of Electrophy,
Schemes to generate entangled photon
pairs via spontaneous parametric down conversion, May
2011.
[Bar05] Franck Barbier, UML 2 et MDE: ingnierie des modles
avec tudes de cas, Dunod, Paris, 2005
(French).
[BHL07] Paul Busch, Teiko Heinonen, and Pekka Lahti,
Heisenberg's uncertainty principle, Physics
Reports 452 (2007), no. 6, 155-176.
[EAA] Mohamed Elboukhari, Abdelmalek Azizi, and Mostafa Azizi,
Integration of Quantum Cryp-
tography in the TLS Protocol: Reality and
Perspectives, MICS 10, 2-4.
[GG08] Joseph Gabay and David Gabay, UML 2 analyse et
conception: mise en oeuvre guide avec
tudes de cas, 2008.
[Hai14] Mart Haitjema, A survey of the prominent quantum key
distribution protocols, URL:
http://www. cse. wustl. edu/ jain/cse571-07/ftp/quantum ( 18.10.
2013), 2014.
[KDB+] E. Karpov, T. Durt, F. Vanden Berge, N. J.
Cerf, and T. dHondt, Cryptographie quantique,
White paper, 10.
[KR02] Ralph Kimball and Margy Ross, The data warehouse
toolkit: the complete guide to dimen-
sional modeling, 2nd ed ed., Wiley, New York, 2002.
[KX] Muhammad Mubashir Khan and Jie Xu, Applications of QKD
Network for High Performance
Distributed Computing.
[Mer07] N. David Mermin, Quantum computer science an
introduction, Cambridge University Press,
Cambridge, 2007 (English).
[MVOV96] Alfred J. Menezes, Paul C. Van Oorschot, and Scott A.
Vanstone, Handbook of applied cryptography, CRC press, 1996.
[NAZ02] Olaf Nairz, Markus Arndt, and Anton Zeilinger,
Experimental verification of the Heisenberg uncertainty principle for
fullerene molecules, Physical Review A 65 (2002), no. 3
(en).
[NC10] Michael A. Nielsen and Isaac L. Chuang, Quantum
computation and quantum information,
10th anniversary ed ed., Cambridge University Press, Cambridge ;
New York, 2010.
[QQL10a] Bing Qi, Li Qian, and Hoi-Kwong Lo, A brief
introduction of quantum cryptography for engineers, arXiv preprint
arXiv:1002.1237 (2010).
[QQL10b] , A brief introduction of quantum cryptography for
engineers, arXiv preprint
arXiv:1002.1237 (2010).
[Sar] Debasis Sarkar, Quantum Entanglement- Fundamental
Aspects.
[Sar14] Mohan Sarovar, Introduction to quantum key
distribution, October 2014.
[Sca09] Valerio Scarani, Quantum information: primitive
notions and quantum correlations, arXiv
preprint arXiv:0910.4222 (2009).
REFERENCES Page 4
[SML10] Douglas Stebila, Michele Mosca, and Norbert Ltkenhaus,
The case for quantum key distri-
bution, Quantum Communication and Quantum Networking,
Springer, 2010, pp. 283-296.
[SRS12] Peter Schartner, Stefan Rass, and Martin Schaffer,
Quantum Key Management, APPLIED
CRYPTOGRAPHY AND NETWORK SECURITY, 2012, p. 227.
[SSL09] Douglas Stebila, Douglas Stebila, and Norbert Ltkenhaus,
The Case for Quantum Key
Distribution, 12.
[STH] M. A. Sfaxi, I. Tashi, and S. Ghernaouti Hlie, How QKD
can improve the security level of
future e-commerce transaction, Proc. 18th European
Regional International Telecommunication Society Conf.(ITS2007), Citeseer, pp.
1-12.
[STI06] Douglas R. STINSON, Cryptography theory and practice
third edition, chapman & Hall
/CRC, Taylor & Francis Group, 2006 (English).
[Tan13] Xiaoqing Tan, Introduction to Quantum
Cryptography, Theory and Practice of Cryptography
and Network Security Protocols and Technologies (Jaydip Sen,
ed.), InTech, July 2013, p. 1 (en).
[VA06a] Gilles Van Assche, Quantum cryptography and
secret-key distillation, Cambridge University
Press, Cambridge ; New York, 2006.
[VA06b] , Quantum cryptography and secret-key
distillation, Cambridge University Press,
2006.
[Zha09] Yi Zhao, Quantum cryptography in real-life
applications: assumptions and security, Ph.D.
thesis, University of Toronto, 2009.
|