Ebook Telecommunications networks – Current status and future trends: Part 2
➤ Gửi thông báo lỗi ⚠️ Báo cáo tài liệu vi phạmNội dung chi tiết: Ebook Telecommunications networks – Current status and future trends: Part 2
Ebook Telecommunications networks – Current status and future trends: Part 2
9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2tion University ^Odessa National Academy of Telecommunication named after OS. PopovUkraineOur scientific field is still in its embryonic stage. It's great that we haven't been around for two thousands years. We are still at a stage where very, very important results occur in front of our eyes Michae Ebook Telecommunications networks – Current status and future trends: Part 2l Rabin1IntroductionToday there is virtually no area where information technology (IT) is not used in some way. Computers support banking systems, conEbook Telecommunications networks – Current status and future trends: Part 2
trol the work of nuclear power plants, and control aircraft, satellites and spacecraft. The high level of automation therefore depends on the security9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2r development secure telecommunication systems. Confidentiality is the basic feature of information security, which ensures that information is accessible only to authorized users who have an access. Integrity is the basic feature of information security indicating its property to resist unauthorize Ebook Telecommunications networks – Current status and future trends: Part 2d modification. Availability is the basic feature of information security that indicates accessible and usable upon demand by an authorized entity.OneEbook Telecommunications networks – Current status and future trends: Part 2
of the most effective ways to ensure confidentiality and data integrity during transmission is cryptographic systems. The purpose of such systems is 9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2 cryptography. This problem can be solved with the help of (SECOQC White Paper on Quantum Key Distribution and Cryptography, 2007; Korchenko et al., 2010a):•Classical information-theoretic schemes (requires channel with noise; efficiency is very low, 1-5%).•Classical public-key cryptography schemes Ebook Telecommunications networks – Current status and future trends: Part 2(Diffie-Hellman scheme, digital envelope scheme; it has computational security).212Telecommunications Networks - Current Status and Future Trends•ClasEbook Telecommunications networks – Current status and future trends: Part 2
sical computationally secure symmetric-key cryptographic schemes (requires a preinstalled key on both sides and can be used only as scheme for increas9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2for increase in key length).•Trusted Couriers Key Distribution (it has a high price and IS dependent on the human factor).In recent years, quantum cryptography (QC) has attracted considerable interest. Quantum key distribution (QKD) (Bennett, 1992; Bennett et al., 1992; Bennett et al., 1995; Bennett Ebook Telecommunications networks – Current status and future trends: Part 2 & Brassard, 1984; Bouwmeester et al., 2000; Gisin et al., 2002; Lùtkenhaus ÒC Shields, 2009; Scarani et al., 2009; Vasihu & Vorobiyenko 2006; WilliamEbook Telecommunications networks – Current status and future trends: Part 2
s, 2011) plays a dominant role in QC. The overwhelming majority of theoretic and practical research projects in QC are related to the development of Q9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2nologies in scientific literature (there are only a few works concerning different classifications of QKD protocols, for example (Gisin et al., 2002; Scarani, et al., 2009)). Tins makes it difficult to estimate the level of the latest achievements and does not allow using quantum technologies with f Ebook Telecommunications networks – Current status and future trends: Part 2ull efficiency. The main purpose of this chapter is the systematisation and classification of up-to-date effective quantum technologies of data (transEbook Telecommunications networks – Current status and future trends: Part 2
mitted via telecommunication channels) security, analysis of their strengths and weaknesses, prospects and difficulties of implementation in telecommu9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2 secure direct communication.•Quantum steganography.•Quantum secret sharing.•Quantum stream cipher.•Quantum digital signature, etc.The theoretical basis of quantum cryptography is stated 111 set of books and review papers (see e.g. Bouwmeester et al., 2000; Gisin et al., 2002; Hayashi, 2006; Imre & Ebook Telecommunications networks – Current status and future trends: Part 2Balazs, 2005; Kollmitzer & Pivk, 2010; Lomonaco, 1998; Nielsen & Chuang, 2000; Schumacher Westmoreland, 2010; Vedral, 2006; Williams, 2011).2Main apprEbook Telecommunications networks – Current status and future trends: Part 2
oaches to quantum secure telecommunication systems construction2.1 Quantum key distributionQKD includes the following protocols: protocols using singl9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2, 2002; Bruss Macchiavello, 2002; Cerf et al., 2002; Gnatyuk et al., 2009); protocols using phase coding (Bennett, 1992); protocols using entangled states (Ekert, 1991; Durt et al., 2004); decoy states protocols (Brassard et al., 2000; Liu et al., 2010; Peng et al., 2007; Yin et al., 2008; Zhao et a Ebook Telecommunications networks – Current status and future trends: Part 2l., 2006a, 2006b); and someQuantum Secure Telecommunication Systems 213other protocols (Bradler, 2005; Lutkenhaus & Shields, 2009; Navascués & Acin, 2Ebook Telecommunications networks – Current status and future trends: Part 2
005; Pirandola et al., 2008).The mam task of QKD protocols is encryption key generation and distribution between two users connecting via quantum and 9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2ett & Brassard, 1984), which has become an alternative solution for the problem of key distribution. This protocol is called BBS4 (Bouwmeester et al., 2000) and it refers to QKD protocols using single qubits. The states of these qubits are the polarisation states of single photons. The BB84 protocol Ebook Telecommunications networks – Current status and future trends: Part 2 uses four polarisation states of photons (O’, 45’, 90’, 135’). These states refer to two mutually unbiased bases. Error searching and correcting is pEbook Telecommunications networks – Current status and future trends: Part 2
erformed using classical public channel, which need not be confidential but only authenticated. For the detection of intruder actions in the BB84 prot9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2 The efficiency of the BB84 protocol equals 50%. Efficiency means the ratio of the photons number which are used for key generation to the general number of transmitted photons.Six-stote protocol requires the usage of four states, which are the same as in the BB84 protocol, and two additional direct Ebook Telecommunications networks – Current status and future trends: Part 2ions of polarization: right circular and left circular (Brass, 1998). Such changes decrease the amount of information, which can be intercepted. But oEbook Telecommunications networks – Current status and future trends: Part 2
n the other hand, the efficiency of the protocol decreases to 33%.Next, the 4+2 protocol is intermediate between the BB84 and B92 protocol (Huttner et9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2ogonaL Moreover, states in different bases must also be pairwise non-orthogonal. This protocol has a higher information security level than the BB84 protocol, when weak coherent pulses, but not a single photon source, are used by sender (Huttner et al., 1995). But the efficiency of the 4+2 protocol Ebook Telecommunications networks – Current status and future trends: Part 2is lower than efficiency of BB84 protocol.In the Goldenberg-ViMdman protocol (GoldenbergEbook Telecommunications networks – Current status and future trends: Part 2
ing two orthogonal states. Each of these two states is the superposition of two localised normalised wave packets. For protection against mtercept-res9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 297). This protocol does not use a random time for sending packets, but it uses an interferometer's non-symmetrisation (the light IS broken in equal proportions between both long and short interferometer arms).The measure of QKD protocol security is Shannon's mutual information between legitimate use Ebook Telecommunications networks – Current status and future trends: Part 2rs (Alice and Bob) and an eavesdropper (Eve): IAE(D) and IEE(D), where D is error level which is created by eavesdropping. For most attacks on QKD proEbook Telecommunications networks – Current status and future trends: Part 2
tocols, I.4E(P) = IEE(D), we will therefore use JAE(D). Tile lower IA£(D) in the extended range of D is, the more secure the protocol is.Six-state pro9Quantum Secure Telecommunication SystemsOleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 National Aviat Ebook Telecommunications networks – Current status and future trends: Part 2the informationGọi ngay
Chat zalo
Facebook