20 research outputs found

    Quantum Cryptography

    Get PDF
    Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic

    Minimizing Decoherence in Optical Fiber for Long Distance Quantum Communication

    Get PDF
    In this research work, I have derived analytical models for decoherence of quantum states of light and developed techniques based on Dynamical Decoupling (DD) to preserve the quantum state of polarization qubit and Orbital Angular Momentum (OAM) qudit in single-mode, multi-mode and specialized optical fibers. In subsequent work, I have derived the analytical model for decoherence of an entangled state in an optical fiber to show that such a decoherence causes loss of entanglement. I also showed that such states can be preserved with DD. In Chapter 1, I have introduced the subject of a quantum computer and its relation to quantum communication. I give a brief overview of fundamental concepts and tools required to understand the subject matter. In Chapter 2, I discuss optical fibers from the perspective of the electromagnetic wave in a waveguide and explain the modes in an optical fiber. Later, I explain about the sources of noise or refractive index fluctuation in an optical fiber and show how to numerically reproduce a model of an optical fiber. In Chapter 3, I introduce the topic of quantum decoherence and discuss in detail an open-loop control technique called Dynamical Decoupling, that is applied to the system to minimize decoherence. I discuss ideal and nonideal pulse sequences used for suppressing decoherence. In Chapter 4, I derive the analytical model for decoherence of a polarization qubit in a single-mode, multi-mode fiber, and decoherence OAM qudit in specialized multi-mode fiber. In Chapter 5, I introduce the topic of entanglement for the bipartite system and multi-partite system, and a measure called concurrence to quantify the entanglement. I then derive the analytic model for decoherence of a pure entangled state and show that decoherence causes loss of entanglement for the case of a pure and mixed Werner-like state. \break In Chapter 6, I discuss the method of numerical simulation and show by numerical simulation that polarization qubit, OAM qudit and entanglement of polarization qudit can be preserved with dynamical decoupling in an optical fiber. In Chapter 7, I have summarized the results and discuss the scope of future work. In the appendix, I have included additional research work not directly related to the current topic of decoherence in an optical fiber. To summarize my research, I have derived a model for decoherence and then numerically showed that a polarization qubit can be preserved in a single mode and multi-mode optical fiber. I also show that an OAM qudit can be preserved for a certain maximum value of quantum number l . Finally, I show that entanglement of pure and Werner mixed states can be preserved

    An谩lisis de algoritmos criptogr谩ficos cl谩sicos vs algoritmos cu谩nticos.

    Get PDF
    En este trabajo de investigaci贸n se realiz贸 una comparaci贸n de los algoritmos criptogr谩ficos cu谩nticos vs cl谩sicos con respecto a la seguridad en la obtenci贸n de la clave, en base a una revisi贸n sistem谩tica de donde se defini贸 par谩metros medibles de comparaci贸n, entre estos algoritmos como: la unidad estructural de la informaci贸n, base de su seguridad, origen de la clave, tama帽o de la clave, si el atacante copia la informaci贸n, detecci贸n de intrusos y tecnolog铆a aplicada en el mercado, es de importancia conocer el algoritmo criptogr谩fico m谩s fuerte para la seguridad de la informaci贸n debido a que la tecnolog铆a va en incremento y al mismo tiempo la informaci贸n se convierte en un activo de gran valor a proteger ya que los hackers al interceptar informaci贸n pueden realizar denegaci贸n de servicios, falta de integridad en datos, da帽os f铆sicos a estructuras, robos millonarios de d贸lares e informaci贸n. Tambi茅n se desarroll贸 el estudio t茅cnico-econ贸mico para la de implementar un sistema cu谩ntico en una infraestructura gubernamental del Consejo Nacional Electoral (CNE). Del estudio se determin贸 que los algoritmos criptogr谩ficos cu谩nticos son m谩s apropiados para este prop贸sito, esto se demostr贸 con el m茅todo estad铆stico CHI cuadrado, para la comprobaci贸n de hip贸tesis. Se concluye que es t茅cnicamente factible la propuesta de implementar criptograf铆a cu谩ntica con el algoritmo BB84 en la estructura nacional gubernamental CNE, con una inversi贸n aproximada al 0.022% del gasto p煤blico de 2017. Se recomienda implementar la propuesta t茅cnica econ贸mica planteada en la presente investigaci贸n para en la infraestructura de CNE en funci贸n de garantizar la seguridad de la informaci贸n.In this research work, a comparison of quantum vs classical cryptographic algorithms was made with regard to the security in obtaining the key, it was based on a systematic review where measurable parameters of comparison were defined, among these algorithms as: the structural unit of information, base of its security, key origin, key size, if the attacker copies the information, intrusion detection and technology applied in the market, it is important to know the strongest cryptographic algorithm for the security of the information because the technology is increasing and at the same time the information becomes a valuable asset to protect since the hackers when intercepting information can perform denial of services, lack of data integrity, physical damage to structures, thefts of millions of dollars and information. Also the technical-economic study was developed to implement a quantum system in a governmental infrastructure of the National Electoral Council (NEC). From the study, it was determined that the quantum cryptographic algorithms are more appropriate for this purpose; this was demonstrated with the CHI square statistical method, for the verification of the hypothesis. It is concluded that the proposal to implement quantum cryptography with the BB84 algorithm in the national government structure NEC is technically feasible, with an approximate investment of 0.022% of public expenditure in 2017. It is recommended to implement the economic technical proposal raised in this research for the infrastructure of NEC in order to guarantee the security of the information

    An谩lisis de algoritmos criptogr谩ficos cl谩sicos vs algoritmos cu谩nticos.

    Get PDF
    En este trabajo de investigaci贸n se realiz贸 una comparaci贸n de los algoritmos criptogr谩ficos cu谩nticos vs cl谩sicos con respecto a la seguridad en la obtenci贸n de la clave, en base a una revisi贸n sistem谩tica de donde se defini贸 par谩metros medibles de comparaci贸n, entre estos algoritmos como: la unidad estructural de la informaci贸n, base de su seguridad, origen de la clave, tama帽o de la clave, si el atacante copia la informaci贸n, detecci贸n de intrusos y tecnolog铆a aplicada en el mercado, es de importancia conocer el algoritmo criptogr谩fico m谩s fuerte para la seguridad de la informaci贸n debido a que la tecnolog铆a va en incremento y al mismo tiempo la informaci贸n se convierte en un activo de gran valor a proteger ya que los hackers al interceptar informaci贸n pueden realizar denegaci贸n de servicios, falta de integridad en datos, da帽os f铆sicos a estructuras, robos millonarios de d贸lares e informaci贸n. Tambi茅n se desarroll贸 el estudio t茅cnico-econ贸mico para la de implementar un sistema cu谩ntico en una infraestructura gubernamental del Consejo Nacional Electoral (CNE). Del estudio se determin贸 que los algoritmos criptogr谩ficos cu谩nticos son m谩s apropiados para este prop贸sito, esto se demostr贸 con el m茅todo estad铆stico CHI cuadrado, para la comprobaci贸n de hip贸tesis. Se concluye que es t茅cnicamente factible la propuesta de implementar criptograf铆a cu谩ntica con el algoritmo BB84 en la estructura nacional gubernamental CNE, con una inversi贸n aproximada al 0.022% del gasto p煤blico de 2017. Se recomienda implementar la propuesta t茅cnica econ贸mica planteada en la presente investigaci贸n para en la infraestructura de CNE en funci贸n de garantizar la seguridad de la informaci贸n.In this research work, a comparison of quantum vs classical cryptographic algorithms was made with regard to the security in obtaining the key, it was based on a systematic review where measurable parameters of comparison were defined, among these algorithms as: the structural unit of information, base of its security, key origin, key size, if the attacker copies the information, intrusion detection and technology applied in the market, it is important to know the strongest cryptographic algorithm for the security of the information because the technology is increasing and at the same time the information becomes a valuable asset to protect since the hackers when intercepting information can perform denial of services, lack of data integrity, physical damage to structures, thefts of millions of dollars and information. Also the technical-economic study was developed to implement a quantum system in a governmental infrastructure of the National Electoral Council (NEC). From the study, it was determined that the quantum cryptographic algorithms are more appropriate for this purpose; this was demonstrated with the CHI square statistical method, for the verification of the hypothesis. It is concluded that the proposal to implement quantum cryptography with the BB84 algorithm in the national government structure NEC is technically feasible, with an approximate investment of 0.022% of public expenditure in 2017. It is recommended to implement the economic technical proposal raised in this research for the infrastructure of NEC in order to guarantee the security of the information
    corecore