6,127 research outputs found
Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm
With the rapid evolution of data exchange in network environments,
information security has been the most important process for data storage and
communication. In order to provide such information security, the
confidentiality, data integrity, and data origin authentication must be
verified based on cryptographic encryption algorithms. This paper presents a
new emerging trend of modern symmetric encryption algorithm by development of
the advanced encryption standard (AES) algorithm. The new development focuses
on the integration between Quantum Key Distribution (QKD) and an enhanced
version of AES. A new quantum symmetric encryption algorithm, which is
abbreviated as Quantum-AES (QAES), is the output of such integration. QAES
depends on generation of dynamic quantum S-Boxes (DQS-Boxes) based quantum
cipher key, instead of the ordinary used static S-Boxes. Furthermore, QAES
exploits the specific selected secret key generated from the QKD cipher using
two different modes (online and off-line)
A quantum key distribution protocol for rapid denial of service detection
We introduce a quantum key distribution protocol designed to expose fake
users that connect to Alice or Bob for the purpose of monopolising the link and
denying service. It inherently resists attempts to exhaust Alice and Bob's
initial shared secret, and is 100% efficient, regardless of the number of
qubits exchanged above the finite key limit. Additionally, secure key can be
generated from two-photon pulses, without having to make any extra
modifications. This is made possible by relaxing the security of BB84 to that
of the quantum-safe block cipher used for day-to-day encryption, meaning the
overall security remains unaffected for useful real-world cryptosystems such as
AES-GCM being keyed with quantum devices.Comment: 13 pages, 3 figures. v2: Shifted focus of paper towards DoS and added
protocol 4. v1: Accepted to QCrypt 201
Cloud Computing in the Quantum Era
Cloud computing has become the prominent technology of this era. Its elasticity, dynamicity, availability, heterogeneity, and pay as you go pricing model has attracted several companies to migrate their businesses' services into the cloud. This gives them more time to focus solely on their businesses and reduces the management and backup overhead leveraging the flexibility of cloud computing. On the other hand, quantum technology is developing very rapidly. Experts are expecting to get an efficient quantum computer within the next decade. This has a significant impact on several sciences including cryptography, medical research, and other fields. This paper analyses the reciprocal impact of quantum technology on cloud computing and vice versa
Quantum Key Distribution
This chapter describes the application of lasers, specifically diode lasers,
in the area of quantum key distribution (QKD). First, we motivate the
distribution of cryptographic keys based on quantum physical properties of
light, give a brief introduction to QKD assuming the reader has no or very
little knowledge about cryptography, and briefly present the state-of-the-art
of QKD. In the second half of the chapter we describe, as an example of a
real-world QKD system, the system deployed between the University of Calgary
and SAIT Polytechnic. We conclude the chapter with a brief discussion of
quantum networks and future steps.Comment: 20 pages, 12 figure
Roadmap on optical security
Postprint (author's final draft
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution
We report on the design and performance of a point-to-point classical
symmetric encryption link with fast key renewal provided by a Continuous
Variable Quantum Key Distribution (CVQKD) system. Our system was operational
and able to encrypt point-to-point communications during more than six months,
from the end of July 2010 until the beginning of February 2011. This field test
was the first demonstration of the reliability of a CVQKD system over a long
period of time in a server room environment. This strengthens the potential of
CVQKD for information technology security infrastructure deployments
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
- âŠ