2 research outputs found
On quantum cryptography
In the late twentieth century, human race entered the era of
information technology (IT). The IT industry, which deals with the production,
processing, storage and transmission of information, has become an integral
part of the global economic system, a completely independent and significant
sector of the economy. The dependence of the modern society on information
technologies is so great that omissions in information systems may lead to
significant incidents. Telecommunications are the key information technology
industry. However, information is very susceptible to various types of abuse
during transmission. The units for data storage and processing can be
physically protected from anyone wishing harm, but this does not hold true
for the communication lines that span hundreds or thousands of kilometers
and are virtually impossible to protect. Therefore, the problem of information
protection in the field of telecommunications is highly significant. Cryptology,
particularly cryptography, deals with this issue. Quantum cryptography is a
relatively new field ensuring safe communication between the sender and the
recipient using the laws of quantum physics. This paper seeks to address the
principles of the quantum distribution of a key for information encryption and
the fundamental problems arising from the execution.ΠΡΠ°ΡΠ΅ΠΌ Π΄Π²Π°Π΄Π΅ΡΠ΅ΡΠΎΠ³ Π²Π΅ΠΊΠ° ΡΠΎΠ²Π΅ΡΠ°Π½ΡΡΠ²ΠΎ je ΡΡΠ»ΠΎ Ρ Π΅ΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ’ ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ°, ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΡΠΎΠΌ, ΠΎΠ±ΡΠ°Π΄ΠΎΠΌ,
ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ΠΌ ΠΈ ΠΏΡΠ΅Π½ΠΎΡΠΎΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°, ΠΏΠΎΡΡΠ°Π»Π° ΡΠ΅ ΡΠ°ΡΡΠ°Π²Π½ΠΈ Π΄eΠΎ Π³Π»ΠΎΠ±Π°Π»Π½ΠΎΠ³
Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠΎΠ³ ΡΠΈΡΡΠ΅ΠΌΠ°, ΠΏΠΎΡΠΏΡΠ½ΠΎ Π½Π΅Π·Π°Π²ΠΈΡΠ°Π½ ΠΈ ΠΏΡΠΈΠ»ΠΈΡΠ½ΠΎ Π·Π½Π°ΡΠ°ΡΠ°Π½ ΡΠ΅ΠΊΡΠΎΡ ΠΏΡΠΈΠ²ΡeΠ΄Π΅. ΠΠ°Π²ΠΈΡΠ½ΠΎΡΡ ΡΠ°Π²ΡΠ΅ΠΌΠ΅Π½ΠΎΠ³ Π΄ΡΡΡΡΠ²Π° ΠΎΠ΄ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΡΠ΅ ΡΠΎΠ»ΠΈΠΊΠΎ
Π²Π΅Π»ΠΈΠΊΠ° Π΄Π° ΠΏΡΠΎΠΏΡΡΡΠΈ Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΠΌ ΡΠΈΡΡΠ΅ΠΌΠΈΠΌΠ° ΠΌΠΎΠ³Ρ Π΄ΠΎΠ²Π΅ΡΡΠΈ Π΄ΠΎ Π·Π½Π°ΡΠ°ΡΠ½ΠΈΡ
ΠΈΠ½ΡΠΈΠ΄Π΅Π½Π°ΡΠ°. Π’Π΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡe ΡΡ ΠΊΡΡΡΠ½Π° ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ΅ΡΡΡΠΈΠΌ, ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅ ΡΡ ΡΠΎΠΊΠΎΠΌ ΡΡΠ°Π½ΡΠΏΠΎΡΡΠ° Π²Π΅ΠΎΠΌΠ° ΠΎΡΠ΅ΡΡΠΈΠ²Π΅
Π½Π° ΡΠ°Π·Π½Π΅ Π²ΡΡΡΠ΅ Π·Π»ΠΎΡΠΏΠΎΡΡΠ΅Π±Π°. ΠΠ΅Π΄ΠΈΠ½ΠΈΡΠ΅ Π·Π° ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ ΠΈ ΠΎΠ±ΡΠ°Π΄Ρ ΠΏΠΎΠ΄Π°ΡΠ°ΠΊΠ°
ΠΌΠΎΠ³Ρ Π±ΠΈΡΠΈ ΡΠΈΠ·ΠΈΡΠΊΠΈ Π·Π°ΡΡΠΈΡΠ΅Π½Π΅ ΠΎΠ΄ Π½Π΅Π΄ΠΎΠ±ΡΠΎΠ½Π°ΠΌΠ΅ΡΠ½ΠΈΡ
, ΡΡΠΎ ΡΠ΅ Π½Π΅ ΠΌΠΎΠΆΠ΅ ΡΠ΅ΡΠΈ Π·Π° ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π΅ Π»ΠΈΠ½ΠΈΡΠ΅ ΠΊΠΎΡΠ΅ ΡΠ΅ ΠΏΡΠΎΡΠ΅ΠΆΡ Π½Π° ΡΡΠΎΡΠΈΠ½Π΅ ΠΈΠ»ΠΈ Ρ
ΠΈΡΠ°Π΄Π΅ ΠΊΠΈΠ»ΠΎΠΌΠ΅ΡΠ°ΡΠ° ΠΈ
ΠΊΠΎΡΠ΅ ΡΠ΅ Π³ΠΎΡΠΎΠ²ΠΎ Π½Π΅ΠΌΠΎΠ³ΡΡΠ΅ Π·Π°ΡΡΠΈΡΠΈΡΠΈ. Π‘ΡΠΎΠ³Π° ΡΠ΅ ΠΏΡΠΎΠ±Π»Π΅ΠΌ Π·Π°ΡΡΠΈΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°
Ρ ΡΡΠ΅ΡΠΈ ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ° Π²Π΅ΠΎΠΌΠ° Π·Π½Π°ΡΠ°ΡΠ°Π½. ΠΡΠΈΠΏΡΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΠΊΠ°ΠΎ Π½Π°ΡΠΊΠ° ΠΈ ΠΏΠΎΡΠ΅Π±Π½ΠΎ ΡΠ΅Π½ Π΄Π΅ΠΎ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠΏΡΠ°Π²ΠΎ ΡΠ΅ Π±Π°Π²Π΅ ΠΎΠ²ΠΎΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠΎΠΌ. ΠΠ²Π°Π½ΡΠ½Π°
ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠ΅ ΡΠ΅Π»Π°ΡΠΈΠ²Π½ΠΎ Π½ΠΎΠ²ΠΈΡΠ° ΠΎΠ±Π»Π°ΡΡ ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΎΠ±Π΅Π·Π±Π΅ΡΠ΅ΡΠ΅ΠΌ ΡΠΈΠ³ΡΡΠ½Π΅
ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ΅ ΠΈΠ·ΠΌΠ΅ΡΡ ΠΏΠΎΡΠΈΡΠ°ΠΎΡΠ° ΠΈ ΠΏΡΠΈΠΌΠ°ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅, ΠΊΠΎΡΠΈΡΡΠ΅ΡΠΈ Π·Π°ΠΊΠΎΠ½Π΅ ΠΊΠ²Π°Π½ΡΠ½Π΅ ΡΠΈΠ·ΠΈΠΊΠ΅. Π¦ΠΈΡ ΡΠ°Π΄Π° ΡΠ΅ Π΄Π° ΡΠ΅ ΡΠΏΠΎΠ·Π½Π°ΠΌΠΎ ΡΠ° ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈΠΌΠ° ΠΊΠ²Π°Π½ΡΠ½Π΅
Π΄ΠΈΡΡΡΠΈΠ±ΡΡΠΈΡΠ΅ ΠΊΡΡΡΠ° Π·Π° ΠΊΠΎΠ΄ΠΈΡΠ°ΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ° ΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈΠΌΠ° ΠΊΠΎΡΠΈ ΡΠ΅ ΡΠ°Π²ΡΠ°ΡΡ ΠΏΡΠΈ ΡΠ΅Π³ΠΎΠ²ΠΎΡ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡΠΈ
On quantum cryptography
In the late twentieth century, human race entered the era ofinformation technology (IT). The IT industry, which deals with the production,processing, storage and transmission of information, has become an integralpart of the global economic system, a completely independent and significantsector of the economy. The dependence of the modern society on informationtechnologies is so great that omissions in information systems may lead tosignificant incidents. Telecommunications are the key information technologyindustry. However, information is very susceptible to various types of abuseduring transmission. The units for data storage and processing can bephysically protected from anyone wishing harm, but this does not hold truefor the communication lines that span hundreds or thousands of kilometersand are virtually impossible to protect. Therefore, the problem of informationprotection in the field of telecommunications is highly significant. Cryptology,particularly cryptography, deals with this issue. Quantum cryptography is arelatively new field ensuring safe communication between the sender and therecipient using the laws of quantum physics. This paper seeks to address theprinciples of the quantum distribution of a key for information encryption andthe fundamental problems arising from the execution.ΠΡΠ°ΡΠ΅ΠΌ Π΄Π²Π°Π΄Π΅ΡΠ΅ΡΠΎΠ³ Π²Π΅ΠΊΠ° ΡΠΎΠ²Π΅ΡΠ°Π½ΡΡΠ²ΠΎ je ΡΡΠ»ΠΎ Ρ Π΅ΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ’ ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ°, ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΡΠΎΠΌ, ΠΎΠ±ΡΠ°Π΄ΠΎΠΌ,ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ΠΌ ΠΈ ΠΏΡΠ΅Π½ΠΎΡΠΎΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°, ΠΏΠΎΡΡΠ°Π»Π° ΡΠ΅ ΡΠ°ΡΡΠ°Π²Π½ΠΈ Π΄eΠΎ Π³Π»ΠΎΠ±Π°Π»Π½ΠΎΠ³Π΅ΠΊΠΎΠ½ΠΎΠΌΡΠΊΠΎΠ³ ΡΠΈΡΡΠ΅ΠΌΠ°, ΠΏΠΎΡΠΏΡΠ½ΠΎ Π½Π΅Π·Π°Π²ΠΈΡΠ°Π½ ΠΈ ΠΏΡΠΈΠ»ΠΈΡΠ½ΠΎ Π·Π½Π°ΡΠ°ΡΠ°Π½ ΡΠ΅ΠΊΡΠΎΡ ΠΏΡΠΈΠ²ΡeΠ΄Π΅. ΠΠ°Π²ΠΈΡΠ½ΠΎΡΡ ΡΠ°Π²ΡΠ΅ΠΌΠ΅Π½ΠΎΠ³ Π΄ΡΡΡΡΠ²Π° ΠΎΠ΄ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΡΠ΅ ΡΠΎΠ»ΠΈΠΊΠΎΠ²Π΅Π»ΠΈΠΊΠ° Π΄Π° ΠΏΡΠΎΠΏΡΡΡΠΈ Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΠΌ ΡΠΈΡΡΠ΅ΠΌΠΈΠΌΠ° ΠΌΠΎΠ³Ρ Π΄ΠΎΠ²Π΅ΡΡΠΈ Π΄ΠΎ Π·Π½Π°ΡΠ°ΡΠ½ΠΈΡ
ΠΈΠ½ΡΠΈΠ΄Π΅Π½Π°ΡΠ°. Π’Π΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡe ΡΡ ΠΊΡΡΡΠ½Π° ΠΈΠ½Π΄ΡΡΡΡΠΈΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½ΠΈΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡΠ°. ΠΠ΅ΡΡΡΠΈΠΌ, ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅ ΡΡ ΡΠΎΠΊΠΎΠΌ ΡΡΠ°Π½ΡΠΏΠΎΡΡΠ° Π²Π΅ΠΎΠΌΠ° ΠΎΡΠ΅ΡΡΠΈΠ²Π΅Π½Π° ΡΠ°Π·Π½Π΅ Π²ΡΡΡΠ΅ Π·Π»ΠΎΡΠΏΠΎΡΡΠ΅Π±Π°. ΠΠ΅Π΄ΠΈΠ½ΠΈΡΠ΅ Π·Π° ΡΠΊΠ»Π°Π΄ΠΈΡΡΠ΅ΡΠ΅ ΠΈ ΠΎΠ±ΡΠ°Π΄Ρ ΠΏΠΎΠ΄Π°ΡΠ°ΠΊΠ°ΠΌΠΎΠ³Ρ Π±ΠΈΡΠΈ ΡΠΈΠ·ΠΈΡΠΊΠΈ Π·Π°ΡΡΠΈΡΠ΅Π½Π΅ ΠΎΠ΄ Π½Π΅Π΄ΠΎΠ±ΡΠΎΠ½Π°ΠΌΠ΅ΡΠ½ΠΈΡ
, ΡΡΠΎ ΡΠ΅ Π½Π΅ ΠΌΠΎΠΆΠ΅ ΡΠ΅ΡΠΈ Π·Π° ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π΅ Π»ΠΈΠ½ΠΈΡΠ΅ ΠΊΠΎΡΠ΅ ΡΠ΅ ΠΏΡΠΎΡΠ΅ΠΆΡ Π½Π° ΡΡΠΎΡΠΈΠ½Π΅ ΠΈΠ»ΠΈ Ρ
ΠΈΡΠ°Π΄Π΅ ΠΊΠΈΠ»ΠΎΠΌΠ΅ΡΠ°ΡΠ° ΠΈΠΊΠΎΡΠ΅ ΡΠ΅ Π³ΠΎΡΠΎΠ²ΠΎ Π½Π΅ΠΌΠΎΠ³ΡΡΠ΅ Π·Π°ΡΡΠΈΡΠΈΡΠΈ. Π‘ΡΠΎΠ³Π° ΡΠ΅ ΠΏΡΠΎΠ±Π»Π΅ΠΌ Π·Π°ΡΡΠΈΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ°Ρ ΡΡΠ΅ΡΠΈ ΡΠ΅Π»Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ° Π²Π΅ΠΎΠΌΠ° Π·Π½Π°ΡΠ°ΡΠ°Π½. ΠΡΠΈΠΏΡΠΎΠ»ΠΎΠ³ΠΈΡΠ° ΠΊΠ°ΠΎ Π½Π°ΡΠΊΠ° ΠΈ ΠΏΠΎΡΠ΅Π±Π½ΠΎ ΡΠ΅Π½ Π΄Π΅ΠΎ ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠΏΡΠ°Π²ΠΎ ΡΠ΅ Π±Π°Π²Π΅ ΠΎΠ²ΠΎΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠ°ΡΠΈΠΊΠΎΠΌ. ΠΠ²Π°Π½ΡΠ½Π°ΠΊΡΠΈΠΏΡΠΎΠ³ΡΠ°ΡΠΈΡΠ° ΡΠ΅ ΡΠ΅Π»Π°ΡΠΈΠ²Π½ΠΎ Π½ΠΎΠ²ΠΈΡΠ° ΠΎΠ±Π»Π°ΡΡ ΠΊΠΎΡΠ° ΡΠ΅ Π±Π°Π²ΠΈ ΠΎΠ±Π΅Π·Π±Π΅ΡΠ΅ΡΠ΅ΠΌ ΡΠΈΠ³ΡΡΠ½Π΅ΠΊΠΎΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΡΠ΅ ΠΈΠ·ΠΌΠ΅ΡΡ ΠΏΠΎΡΠΈΡΠ°ΠΎΡΠ° ΠΈ ΠΏΡΠΈΠΌΠ°ΠΎΡΠ° ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ΅, ΠΊΠΎΡΠΈΡΡΠ΅ΡΠΈ Π·Π°ΠΊΠΎΠ½Π΅ ΠΊΠ²Π°Π½ΡΠ½Π΅ ΡΠΈΠ·ΠΈΠΊΠ΅. Π¦ΠΈΡ ΡΠ°Π΄Π° ΡΠ΅ Π΄Π° ΡΠ΅ ΡΠΏΠΎΠ·Π½Π°ΠΌΠΎ ΡΠ° ΠΏΡΠΈΠ½ΡΠΈΠΏΠΈΠΌΠ° ΠΊΠ²Π°Π½ΡΠ½Π΅Π΄ΠΈΡΡΡΠΈΠ±ΡΡΠΈΡΠ΅ ΠΊΡΡΡΠ° Π·Π° ΠΊΠΎΠ΄ΠΈΡΠ°ΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΡΠ° ΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΠΈΠΌ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΈΠΌΠ° ΠΊΠΎΡΠΈ ΡΠ΅ ΡΠ°Π²ΡΠ°ΡΡ ΠΏΡΠΈ ΡΠ΅Π³ΠΎΠ²ΠΎΡ ΡΠ΅Π°Π»ΠΈΠ·Π°ΡΠΈΡΠΈ.Serbian version: [http://cer.ihtm.bg.ac.rs/handle/123456789/3472