DocumentCode
3149399
Title
Quantum network security
Author
Ghonaimy, M.A.
Author_Institution
Ain Shams Univ., Cairo, Egypt
fYear
2009
fDate
14-16 Dec. 2009
Abstract
This talk gives a brief overview of how to use basic concepts of quantum mechanics to achieve unconditional network security. Quantum key distribution (QKD) is used for this purpose to enhance Vernam ciphers. A protocol used for QKD is the Bennett-Brassard (BB84) protocol, which uses 4 nonorthogonal quantum states. Ideally, it uses single photon generators and a quantum channel assisted by a classical channel to achieve secure key generation. Sometimes, for ease of implementation, weak coherent laser pulses are used instead of single photons. In this case, the protocol is vulnerable to photon number splitting (PNS) attack. In order to counter this attack, decoy state method could be used. A brief outline will be given for this approach. Other types of QKD use entangled photon states, and an example for such protocols will be briefly outlined. QKD has reached the commercial stage, and a number of companies that have available products and solutions will be listed.
Keywords
quantum theory; security of data; Bennett-Brassard protocol; Vernam ciphers; decoy state method; photon number splitting attack; quantum key distribution; quantum mechanics; quantum network security; secure key generation; single photon generators; Biographies; Counting circuits; Information systems; Optical pulses; Protocols; Quantum mechanics;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Engineering & Systems, 2009. ICCES 2009. International Conference on
Conference_Location
Cairo
Print_ISBN
978-1-4244-5842-4
Type
conf
DOI
10.1109/ICCES.2009.5383322
Filename
5383322
Link To Document