3,496 research outputs found
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that
allows the secure distribution of a bit string, used as key in cryptographic
protocols. When it was noted that quantum computers could break public key
cryptosystems based on number theory extensive studies have been undertaken on
QKD. Based on quantum mechanics, QKD offers unconditionally secure
communication. Now, the progress of research in this field allows the
anticipation of QKD to be available outside of laboratories within the next few
years. Efforts are made to improve the performance and reliability of the
implemented technologies. But several challenges remain despite this big
progress. The task of how to test the apparatuses of QKD For example did not
yet receive enough attention. These devises become complex and demand a big
verification effort. In this paper we are interested in an approach based on
the technique of probabilistic model checking for studying quantum information.
Precisely, we use the PRISM tool to analyze the security of BB84 protocol and
we are focused on the specific security property of eavesdropping detection. We
show that this property is affected by the parameters of quantum channel and
the power of eavesdropper.Comment: 12 Pages, IJNS
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Quantum key distribution (QKD) allows two remote parties to grow a shared
secret key. Its security is founded on the principles of quantum mechanics, but
in reality it significantly relies on the physical implementation.
Technological imperfections of QKD systems have been previously explored, but
no attack on an established QKD connection has been realized so far. Here we
show the first full-field implementation of a complete attack on a running QKD
connection. An installed eavesdropper obtains the entire 'secret' key, while
none of the parameters monitored by the legitimate parties indicate a security
breach. This confirms that non-idealities in physical implementations of QKD
can be fully practically exploitable, and must be given increased scrutiny if
quantum cryptography is to become highly secure.Comment: Revised after editorial and peer-review feedback. This version is
published in Nat. Commun. 8 pages, 6 figures, 1 tabl
Group theory in cryptography
This paper is a guide for the pure mathematician who would like to know more
about cryptography based on group theory. The paper gives a brief overview of
the subject, and provides pointers to good textbooks, key research papers and
recent survey papers in the area.Comment: 25 pages References updated, and a few extra references added. Minor
typographical changes. To appear in Proceedings of Groups St Andrews 2009 in
Bath, U
100 MHz Amplitude and Polarization Modulated Optical Source for Free-Space Quantum Key Distribution at 850 nm
We report on an integrated photonic transmitter of up to 100 MHz repetition
rate, which emits pulses centered at 850 nm with arbitrary amplitude and
polarization. The source is suitable for free space quantum key distribution
applications. The whole transmitter, with the optical and electronic components
integrated, has reduced size and power consumption. In addition, the
optoelectronic components forming the transmitter can be space-qualified,
making it suitable for satellite and future space missions.Comment: 6 figures, 2 table
Photonic Entanglement for Fundamental Tests and Quantum Communication
Entanglement is at the heart of fundamental tests of quantum mechanics like
tests of Bell-inequalities and, as discovered lately, of quantum computation
and communication. Their technological advance made entangled photons play an
outstanding role in entanglement physics. We give a generalized concept of
qubit entanglement and review the state of the art of photonic experiments.Comment: 54 pages, 33 figures. Review article submitted to QIC (Rinton
- …