135 research outputs found

    Modeling, Simulation, and Analysis of a Decoy State Enabled Quantum Key Distribution System

    Get PDF
    Quantum Key Distribution (QKD) is an emerging technology which uses the principles of quantum mechanics to provide unconditionally secure key distribution. QKD systems are unique in their ability to detect an eavesdropper\u27s presence and are being marketed for applications where high levels of secrecy are required such as banking, government, and military environments. QKD systems are composed of electrical, optical, and electrooptical components. Their design requires expertise across multiple disciplines including computer science, computer engineering, electrical engineering, information theory, optical physics, and quantum physics. This multidisciplinary nature makes QKD an ideal candidate for study using Model Based Systems Engineering (MBSE) Processes, Methods, and Tools (PMTs). The primary research goal is to gain understanding of the operation and performance of the QKD decoy state protocol through the use of MBSE PMTs. The main research contributions include development of a decoy state model, validation of the this protocol in a QKD system model implementation, and confirmation that application of MBSE PMTs are critical to the understanding and analysis of complex systems. This work presents the first known application of MBSE PMTs to analyze a QKD system and provides utility to system developers, designers and analysts who seek to quantify performance and security

    A Methodology for Evaluating Relational and NoSQL Databases for Small-Scale Storage and Retrieval

    Get PDF
    Modern systems record large quantities of electronic data capturing time-ordered events, system state information, and behavior. Subsequent analysis enables historic and current system status reporting, supports fault investigations, and may provide insight for emerging system trends. Unfortunately, the management of log data requires ever more efficient and complex storage tools to access, manipulate, and retrieve these records. Truly effective solutions also require a well-planned architecture supporting the needs of multiple stakeholders. Historically, database requirements were well-served by relational data models, however modern, non-relational databases, i.e. NoSQL, solutions, initially intended for “big data” distributed system may also provide value for smaller-scale problems such as those required by log data. However, no evaluation method currently exists to adequately compare the capabilities of traditional (relational database) and modern NoSQL solutions for small-scale problems. This research proposes a methodology to evaluate modern data storage and retrieval systems. While the methodology is intended to be generalizable to many data sources, a commercially-produced unmanned aircraft system served as a representative use case to test the methodology for aircraft log data. The research first defined the key characteristics of database technologies and used those characteristics to inform laboratory simulations emulating representative examples of modern database technologies (relational, key-value, columnar, document, and graph). Based on those results, twelve evaluation criteria were proposed to compare the relational and NoSQL database types. The Analytical Hierarchy Process was then used to combine literature findings, laboratory simulations, and user inputs to determine the most suitable database type for the log data use case. The study results demonstrate the efficacy of the proposed methodology

    Modeling Quantum Optical Components, Pulses and Fiber Channels Using OMNeT++

    Full text link
    Quantum Key Distribution (QKD) is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to model and understand the impact these non-idealities have on system performance and security. OMNeT++ has been used as a basis to develop a simulation framework to support this endeavor. This framework, referred to as "qkdX" extends OMNeT++'s module and message abstractions to efficiently model optical components, optical pulses, operating protocols and processes. This paper presents the design of this framework including how OMNeT++'s abstractions have been utilized to model quantum optical components, optical pulses, fiber and free space channels. Furthermore, from our toolbox of created components, we present various notional and real QKD systems, which have been studied and analyzed.Comment: Published in: A. F\"orster, C. Minkenberg, G. R. Herrera, M. Kirsche (Eds.), Proc. of the 2nd OMNeT++ Community Summit, IBM Research - Zurich, Switzerland, September 3-4, 201

    Integrating Cost as a Decision Variable in Wargames

    Get PDF
    The US military can no longer afford to be reactive, leaving critical cost analyses to the months and years following operations or full-scale conflicts. By leveraging cost in wargaming as part of the Joint planning process, DOD can provide Congress and the American taxpayers a range of potential costs associated with various military engagements that reflect fiscal and operational realities

    Evaluation Criteria for Selecting NoSQL Databases in a Single Box Environment

    Get PDF
    In recent years, NoSQL database systems have become increasingly popular, especially for big data, commercial applications. These systems were designed to overcome the scaling and flexibility limitations plaguing traditional relational database management systems (RDBMSs). Given NoSQL database systems have been typically implemented in large-scale distributed environments serving large numbers of simultaneous users across potentially thousands of geographically separated devices, little consideration has been given to evaluating their value within single-box environments. It is postulated some of the inherent traits of each NoSQL database type may be useful, perhaps even preferable, regardless of scale. Thus, this paper proposes criteria conceived to evaluate the usefulness of NoSQL systems in small-scale single-box environments. Specifically, key value, document, column family, and graph database are discussed with respect to the ability of each to provide CRUD transactions in a single-box environment

    Modeling, Simulation, and Performance Analysis of Decoy State Enabled Quantum Key Distribution Systems

    Get PDF
    Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show promise for high-security applications such as banking, government, and military environments. In this work, a detailed performance analysis of decoy state enabled QKD systems is conducted through model and simulation of several common decoy state configurations. The results of this study uniquely demonstrate that the decoy state protocol can ensure Photon Number Splitting (PNS) attacks are detected with high confidence, while maximizing the system’s quantum throughput at no additional cost. Additionally, implementation security guidance is provided for QKD system developers and users

    Optimizing Decoy State Enabled Quantum Key Distribution Systems to Maximize Quantum Throughput and Detect Photon Number Splitting Attacks with High Confidence

    Full text link
    Quantum Key Distribution (QKD) is an innovative quantum communications protocol which exploits the laws of quantum mechanics to generate unconditionally secure cryptographic keying material between two geographically separated parties. The unique nature of QKD shows promise for high-security applications such as those found in banking, government, and military environments. However, QKD systems contain implementation non-idealities which can negatively impact their performance and security.In particular, QKD systems often employ the decoy state protocol to improve system throughput and mitigate the threat of Photon Number Splitting (PNS) attacks. In this work, a detailed analysis of the decoy state protocol is conducted which optimizes both performance in terms of quantum throughput and security with respect to detecting PNS attacks. The results of this study uniquely demonstrate that the decoy state protocol can ensure PNS attacks are detected with high confidence, while maximizing the secure key generation rate at no additional cost. Additionally, implementation security guidance is provided for QKD system developers and users

    Encoding simplicial quantum geometry in group field theories

    Full text link
    We show that a new symmetry requirement on the GFT field, in the context of an extended GFT formalism, involving both Lie algebra and group elements, leads, in 3d, to Feynman amplitudes with a simplicial path integral form based on the Regge action, to a proper relation between the discrete connection and the triad vectors appearing in it, and to a much more satisfactory and transparent encoding of simplicial geometry already at the level of the GFT action.Comment: 15 pages, 2 figures, RevTeX, references adde

    Quantum simplicial geometry in the group field theory formalism: reconsidering the Barrett-Crane model

    Full text link
    A dual formulation of group field theories, obtained by a Fourier transform mapping functions on a group to functions on its Lie algebra, has been proposed recently. In the case of the Ooguri model for SO(4) BF theory, the variables of the dual field variables are thus so(4) bivectors, which have a direct interpretation as the discrete B variables. Here we study a modification of the model by means of a constraint operator implementing the simplicity of the bivectors, in such a way that projected fields describe metric tetrahedra. This involves a extension of the usual GFT framework, where boundary operators are labelled by projected spin network states. By construction, the Feynman amplitudes are simplicial path integrals for constrained BF theory. We show that the spin foam formulation of these amplitudes corresponds to a variant of the Barrett-Crane model for quantum gravity. We then re-examin the arguments against the Barrett-Crane model(s), in light of our construction.Comment: revtex, 24 page

    Bubbles and jackets: new scaling bounds in topological group field theories

    Get PDF
    We use a reformulation of topological group field theories in 3 and 4 dimensions in terms of variables associated to vertices, in 3d, and edges, in 4d, to obtain new scaling bounds for their Feynman amplitudes. In both 3 and 4 dimensions, we obtain a bubble bound proving the suppression of singular topologies with respect to the first terms in the perturbative expansion (in the cut-off). We also prove a new, stronger jacket bound than the one currently available in the literature. We expect these results to be relevant for other tensorial field theories of this type, as well as for group field theory models for 4d quantum gravity.Comment: v2: Minor modifications to match published versio
    corecore