• DocumentCode
    3149399
  • Title

    Quantum network security

  • Author

    Ghonaimy, M.A.

  • Author_Institution
    Ain Shams Univ., Cairo, Egypt
  • fYear
    2009
  • fDate
    14-16 Dec. 2009
  • Abstract
    This talk gives a brief overview of how to use basic concepts of quantum mechanics to achieve unconditional network security. Quantum key distribution (QKD) is used for this purpose to enhance Vernam ciphers. A protocol used for QKD is the Bennett-Brassard (BB84) protocol, which uses 4 nonorthogonal quantum states. Ideally, it uses single photon generators and a quantum channel assisted by a classical channel to achieve secure key generation. Sometimes, for ease of implementation, weak coherent laser pulses are used instead of single photons. In this case, the protocol is vulnerable to photon number splitting (PNS) attack. In order to counter this attack, decoy state method could be used. A brief outline will be given for this approach. Other types of QKD use entangled photon states, and an example for such protocols will be briefly outlined. QKD has reached the commercial stage, and a number of companies that have available products and solutions will be listed.
  • Keywords
    quantum theory; security of data; Bennett-Brassard protocol; Vernam ciphers; decoy state method; photon number splitting attack; quantum key distribution; quantum mechanics; quantum network security; secure key generation; single photon generators; Biographies; Counting circuits; Information systems; Optical pulses; Protocols; Quantum mechanics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering & Systems, 2009. ICCES 2009. International Conference on
  • Conference_Location
    Cairo
  • Print_ISBN
    978-1-4244-5842-4
  • Type

    conf

  • DOI
    10.1109/ICCES.2009.5383322
  • Filename
    5383322