49 research outputs found

    Quantum Cryptography for Wireless Network Communications

    Get PDF

    Fuzzy Switching Controller for the Security in 802.11 Networks

    Get PDF

    The Role of Cryptography in Our Information-Based Society

    Get PDF
    Presentation given virtually at TAMUQ on 2 July 202

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research

    Foreword and editorial

    Full text link

    QUANTUM SECURE COMMUNICATION USING POLARIZATION HOPPING MULTI-STAGE PROTOCOLS

    Get PDF
    This dissertation presents a study of the security and performance of a quantum communication system using multi-stage multi-photon tolerant protocols. Multi-stage protocols are a generalization of the three-stage protocol proposed in 2006 by Subhash Kak. Multi-stage protocols use “Polarization Hopping,” which is the process of changing the polarization state at each stage of transmission. During the execution of a multi-stage protocol, the message transfer always starts by encoding a bit of information in a polarization state; for example, bit 0 is encoded using state |0⟩ and bit 1 is encoded using state|1⟩ whereas, on the channel, the state of polarization is given by α|├ 0⟩┤+β|├ 1⟩┤. In the following α and β are restricted to the real numbers i.e., the polarization stays on the equator of the Poincare sphere. A transformation applied by one communicating party at a given stage will result in new values of α and β. This dissertation analyzes the security of multi-stage, multi-photon tolerant protocols and proposes an upper bound on the average number of photons per pulse in the cases where Fock states and the cases where coherent states are used in the implementation of the three-stage protocol. The derived average number of photons is the maximum limit at which the three-stage protocol can operate at a quantum secure level while operating in a multi-photon domain. In addition, this dissertation studies the vulnerability of the multi-stage protocol to the Trojan horse attack, Photon Number splitting attack (PNS), Amplification attack, as well as the man-in-the middle attack. Moreover, this dissertation proposes a modified version of the multi-stage protocol. This modified version uses an initialization vector and implements a chaining mode between consecutive implementations of the protocol. The modified version is proposed in the case of the three-stage protocol and named a key/message expansion four variables three-stage protocol. The proposed nomenclature is based on the fact that an additional variable is added to secure the three-stage protocol. The introduction of this additional variable has the potential to secure the multi-stage protocol in the multi-photon regime. It results in the eavesdropper having a set of simultaneous equations where the number of variables exceeds the number of equations. The dissertation also addresses the performance of the multi-stage, multi-photon tolerant protocol. An average photon number of 1.5 photon/stage is used to calculate the maximum achievable distance and key transfer rates while using the single-stage protocol over fiber optic cables. We compute the increase in distance as well as data transfer rate while using the single-stage protocol. Channel losses as well as the detector losses are accounted for. Finally, an application of the multi-stage protocol in IEEE 802.11 is proposed. This application provides wireless networks with a quantum-level of security. It proposes the integration of multi-stage protocols into the four-way handshake of IEEE 802.11
    corecore