3 research outputs found

    Information Security in the Quantum Era. Threats to modern cryptography: Grover’s algorithm

    Get PDF
    Information security plays a major role in the dynamics of today’s interconnected world. Despite the successful implementation and effectiveness of modern cryptographic techniques, their inherent limitations can be exploited by quantum computers. In this article we discuss Grover’s quantum searching algorithm and its impact on the security of modern symmetric ciphers. More specifically, we present its formal description and give an implementation of the algorithm using IBM’s Qiskit framework, which allows us to simulate and run the program on a real device

    A Scalable Simulation of the BB84 Protocol Involving Eavesdropping

    Get PDF
    In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we provide a theoretical discussion of the steps Alice and Bob take to reach a shared secret using this protocol, while an eavesdropper Eve is either involved or not. Then, we offer and discuss two distinct implementations that simulate BB84 using IBM’s Qiskit framework, the first being an exercise solved during the “IBM Quantum Challenge” event in early May 2020, while the other was developed independently to showcase the intercept-resend attack strategy in detail. We note the latter’s scalability and increased output verbosity, which allow for a statistical analysis to determine the probability of detecting the act of eavesdropping

    EntangleNet: Theoretical Reestablishment of Entanglement in Quantum Networks †

    No full text
    In the practical context of quantum networks, the most reliable method of transmitting quantum information is via teleportation because quantum states are highly sensitive. However, teleportation consumes a shared maximally entangled state. Two parties Alice and Bob located at separate nodes that wish to reestablish their shared entanglement will not send entangled qubits directly to achieve this goal, but rather employ a more efficient mechanism that ensures minimal time resources. In this paper, we present a quantum routing scheme that exploits entanglement swapping to reestablish consumed entanglement. It improves and generalizes previous work on the subject and reduces the entanglement distribution time by a factor of 4 k in an arbitrary scale quantum network, where N = 4 k - 1 is a required number of quantum nodes located between source and destination. In addition, k is the greatest positive integer considered by Alice or Bob, such that afterwards they choose N quantum switches
    corecore