KHO THƯ VIỆN 🔎

Ebook Telecommunications networks – Current status and future trends: Part 2

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         236 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 













Nội dung chi tiết: Ebook Telecommunications networks – Current status and future trends: Part 2

Ebook Telecommunications networks – Current status and future trends: Part 2

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2tion University ^Odessa National Academy of Telecommunication named after OS. PopovUkraineOur scientific field is still in its embryonic stage. It's g

reat that we haven't been around for two thousands years. We are still at a stage where very, very important results occur in front of our eyes Michae Ebook Telecommunications networks – Current status and future trends: Part 2

l Rabin1IntroductionToday there is virtually no area where information technology (IT) is not used in some way. Computers support banking systems, con

Ebook Telecommunications networks – Current status and future trends: Part 2

trol the work of nuclear power plants, and control aircraft, satellites and spacecraft. The high level of automation therefore depends on the security

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2r development secure telecommunication systems. Confidentiality is the basic feature of information security, which ensures that information is access

ible only to authorized users who have an access. Integrity is the basic feature of information security indicating its property to resist unauthorize Ebook Telecommunications networks – Current status and future trends: Part 2

d modification. Availability is the basic feature of information security that indicates accessible and usable upon demand by an authorized entity.One

Ebook Telecommunications networks – Current status and future trends: Part 2

of the most effective ways to ensure confidentiality and data integrity during transmission is cryptographic systems. The purpose of such systems is

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2 cryptography. This problem can be solved with the help of (SECOQC White Paper on Quantum Key Distribution and Cryptography, 2007; Korchenko et al., 2

010a):•Classical information-theoretic schemes (requires channel with noise; efficiency is very low, 1-5%).•Classical public-key cryptography schemes Ebook Telecommunications networks – Current status and future trends: Part 2

(Diffie-Hellman scheme, digital envelope scheme; it has computational security).212Telecommunications Networks - Current Status and Future Trends•Clas

Ebook Telecommunications networks – Current status and future trends: Part 2

sical computationally secure symmetric-key cryptographic schemes (requires a preinstalled key on both sides and can be used only as scheme for increas

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2for increase in key length).•Trusted Couriers Key Distribution (it has a high price and IS dependent on the human factor).In recent years, quantum cry

ptography (QC) has attracted considerable interest. Quantum key distribution (QKD) (Bennett, 1992; Bennett et al., 1992; Bennett et al., 1995; Bennett Ebook Telecommunications networks – Current status and future trends: Part 2

& Brassard, 1984; Bouwmeester et al., 2000; Gisin et al., 2002; Lùtkenhaus ÒC Shields, 2009; Scarani et al., 2009; Vasihu & Vorobiyenko 2006; William

Ebook Telecommunications networks – Current status and future trends: Part 2

s, 2011) plays a dominant role in QC. The overwhelming majority of theoretic and practical research projects in QC are related to the development of Q

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2nologies in scientific literature (there are only a few works concerning different classifications of QKD protocols, for example (Gisin et al., 2002;

Scarani, et al., 2009)). Tins makes it difficult to estimate the level of the latest achievements and does not allow using quantum technologies with f Ebook Telecommunications networks – Current status and future trends: Part 2

ull efficiency. The main purpose of this chapter is the systematisation and classification of up-to-date effective quantum technologies of data (trans

Ebook Telecommunications networks – Current status and future trends: Part 2

mitted via telecommunication channels) security, analysis of their strengths and weaknesses, prospects and difficulties of implementation in telecommu

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2 secure direct communication.•Quantum steganography.•Quantum secret sharing.•Quantum stream cipher.•Quantum digital signature, etc.The theoretical bas

is of quantum cryptography is stated 111 set of books and review papers (see e.g. Bouwmeester et al., 2000; Gisin et al., 2002; Hayashi, 2006; Imre & Ebook Telecommunications networks – Current status and future trends: Part 2

Balazs, 2005; Kollmitzer & Pivk, 2010; Lomonaco, 1998; Nielsen & Chuang, 2000; Schumacher Westmoreland, 2010; Vedral, 2006; Williams, 2011).2Main appr

Ebook Telecommunications networks – Current status and future trends: Part 2

oaches to quantum secure telecommunication systems construction2.1 Quantum key distributionQKD includes the following protocols: protocols using singl

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2, 2002; Bruss Macchiavello, 2002; Cerf et al., 2002; Gnatyuk et al., 2009); protocols using phase coding (Bennett, 1992); protocols using entangled st

ates (Ekert, 1991; Durt et al., 2004); decoy states protocols (Brassard et al., 2000; Liu et al., 2010; Peng et al., 2007; Yin et al., 2008; Zhao et a Ebook Telecommunications networks – Current status and future trends: Part 2

l., 2006a, 2006b); and someQuantum Secure Telecommunication Systems 213other protocols (Bradler, 2005; Lutkenhaus & Shields, 2009; Navascués & Acin, 2

Ebook Telecommunications networks – Current status and future trends: Part 2

005; Pirandola et al., 2008).The mam task of QKD protocols is encryption key generation and distribution between two users connecting via quantum and

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2ett & Brassard, 1984), which has become an alternative solution for the problem of key distribution. This protocol is called BBS4 (Bouwmeester et al.,

2000) and it refers to QKD protocols using single qubits. The states of these qubits are the polarisation states of single photons. The BB84 protocol Ebook Telecommunications networks – Current status and future trends: Part 2

uses four polarisation states of photons (O’, 45’, 90’, 135’). These states refer to two mutually unbiased bases. Error searching and correcting is p

Ebook Telecommunications networks – Current status and future trends: Part 2

erformed using classical public channel, which need not be confidential but only authenticated. For the detection of intruder actions in the BB84 prot

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2 The efficiency of the BB84 protocol equals 50%. Efficiency means the ratio of the photons number which are used for key generation to the general num

ber of transmitted photons.Six-stote protocol requires the usage of four states, which are the same as in the BB84 protocol, and two additional direct Ebook Telecommunications networks – Current status and future trends: Part 2

ions of polarization: right circular and left circular (Brass, 1998). Such changes decrease the amount of information, which can be intercepted. But o

Ebook Telecommunications networks – Current status and future trends: Part 2

n the other hand, the efficiency of the protocol decreases to 33%.Next, the 4+2 protocol is intermediate between the BB84 and B92 protocol (Huttner et

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2ogonaL Moreover, states in different bases must also be pairwise non-orthogonal. This protocol has a higher information security level than the BB84 p

rotocol, when weak coherent pulses, but not a single photon source, are used by sender (Huttner et al., 1995). But the efficiency of the 4+2 protocol Ebook Telecommunications networks – Current status and future trends: Part 2

is lower than efficiency of BB84 protocol.In the Goldenberg-ViMdman protocol (Goldenberg

Ebook Telecommunications networks – Current status and future trends: Part 2

ing two orthogonal states. Each of these two states is the superposition of two localised normalised wave packets. For protection against mtercept-res

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 297). This protocol does not use a random time for sending packets, but it uses an interferometer's non-symmetrisation (the light IS broken in equal pr

oportions between both long and short interferometer arms).The measure of QKD protocol security is Shannon's mutual information between legitimate use Ebook Telecommunications networks – Current status and future trends: Part 2

rs (Alice and Bob) and an eavesdropper (Eve): IAE(D) and IEE(D), where D is error level which is created by eavesdropping. For most attacks on QKD pro

Ebook Telecommunications networks – Current status and future trends: Part 2

tocols, I.4E(P) = IEE(D), we will therefore use JAE(D). Tile lower IA£(D) in the extended range of D is, the more secure the protocol is.Six-state pro

9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat

Ebook Telecommunications networks – Current status and future trends: Part 2the information

Gọi ngay
Chat zalo
Facebook