3 results on '"B92"'
Search Results
2. Analysis and evaluation of quantum key distribution protocols
- Author
-
Rouhani, Reza
- Subjects
- Protocols of QKD (Quantum Key Distribution), Quantum Key Distribution, quantum cryptography, distribution key, cybersecurity, QuVis, BB84, E91, B92, BBM92, 080402 Data Encryption, 020603 Quantum Information, Computation and Communication
- Abstract
Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize the laws of quantum to create a cryptographic share key to make the communication system secure. The unique feature of QKD assures eavesdropping detectable during quantum communications which is fascinating for a high-level secure environment.Most of the traditional cryptographic methods which we use currently are based on mathematical scheme or Computational complexity theory which are not completely safe. Using quantum cryptography has been achieved extensive steps in communication security establishment. As the information Unit has been changed from “bit” to Quantum bit (Qubit), a new element has been offered that can guarantee the shared information confidentiality between parties. The confidentiality of system is established via exchanging a secret key through a channel of quantum, the key which we use for encrypting the shared data. This structure has quantum integration which has been developed by physics law and techniques of cryptography. This thesis has proposed a modified version of QKD protocol, this new protocol will generate a cryptographic share key for a more efficient, lower cost and secure communication between two parties (sender and Receiver). This new protocol principal is similar to BBM92, but the source of photon moved to sender instead of third-party photon generator, following steps will be executed in this Experiment: • Observe different categories protocols of QKD in details • The Quantum Mechanics Visualisation Project (QuVis) is the simulation software that has been used for implementing the proposed protocol [BB84 with spin] among the other three (BBM92, B92 and BB84). • Probability ratio of error will be tested and compared for all protocols, for this experiment 100 to 5000 photons will be sent. By Analysing collected data in this experiment, it will be determined which one of this four protocols lead the detecting of eavesdropping. Simulation software accomplishes the value of error key probability which receiver can use and should not pass over the range limit of 0.25 & 0.5.
- Published
- 2020
3. Quantum cryptography
- Author
-
Şenay, Volkan, Kılıçkaya, M. Selami, Genel Fizik Anabilim Dalı, Kılıçkaya, Selami, ESOGÜ, Fen Edebiyat Fakültesi, Genel Fizik Ana Bilim Dalı, and ESOGÜ, Fen Edebiyat Fakültesi, Fizik Anabilim Dalı
- Subjects
Fizik ve Fizik Mühendisliği ,Kuantum Anahtar Dağıtım Protokolleri ,Quantum Cryptography ,Gizlilik Artırımı ,Kuantum Kriptografi ,Quantum ,Entanglement ,Yan Kanallar ,Dolanıklık ,BB84 ,SARG ,B92 ,Cryptography ,Bell Esitsizlikleri ,Bell Eşitsizlikleri ,Physics and Physics Engineering ,Quantum Key Distribution Protocols - Abstract
Çalışmanın 1. Bölümde kriptoloji terimleri ve kriptolojinin tarihçesi verilmiş, çeşitli simetrik ve asimetrik şifreleme sistemleri tanıtılmış, bu sistemler içinde doğru uygulandığında kırılamayacağı 1949 yılında bir AT&T mühendisi olan Shannon tarafından teorik olarak da ispatlanmış olan Vernam Şifresi detaylı olarak incelenmiştir. Vernam şifreleme sisteminin sağladığı mutlak güvenlik tamamen rastgele seçilmiş tek kullanımlık anahtarın gizliliğine ve dağıtımının güvenliğine bağlıdır. Fakat prensip olarak, herhangi bir klasik özel kanal kullanıcılara izlenildiklerini fark ettirmeden pasif olarak takip edilebilir ve gizli kalması gereken anahtarın bir rakibin eline geçmesine fırsat verebilir. Bu noktada kuantum kriptografi anahtar dağıtım probleminin çözüldüğü, anahtarın güvenliğinin fizik kuralları ile korunduğu bir anahtar dağıtım tekniği olarak karşımıza çıkmaktadır. Klasik şifreleme sistemlerinin güvenlikleri bazı zor matematiksel problemlerin hesaplanabilme zorluğuna dayanırken, bu teknik kuantum mekaniğine dayanır. Kuantum mekaniğinin ilkelerine göre hatasız iletim hatlarında kaynaktan hedefe iletilmekte olan verinin bozulması arada istenmeyen biri tarafından verinin okunmaya çalışıldığı anlamına gelir. Bu avantajdan yararlanmak suretiyle kullanıcılar arasında eşit anahtar dizilerinin yüzde yüz güvenli biçimde paylaşılabilmesi için BB84, B92, SARG, Ekert protokolü gibi çeşitli anahtar dağıtım protokolleri öne sürülmüştür. Bu protokollerin prensiplerine 2. Bölümde yer verilmiştir.Çalışmanın diğer bölümlerinde genel olarak 1989 yılında başarıyla gerçekleştirilen ilk kuantum anahtar dağıtımı denemesinden günümüze kadar yapılan ve bu alandaki gelişmelere öncülük eden çalışmalara göz atılmış, KAD sistemlerinde yer alan ışık kaynakları, dedektörler ve kuantum kanallar ile kanal kusurlarından kaynaklanan hataların düzeltilmesi ve anahtarın gizliliğinin artırımı için destekleyici işlemler hakkında bilgi verilmiş, 9. Bölümde kuantum kriptografinin güvenliğine değinilmiş, 10. ve son Bölümde ise kuantum kriptografinin geleceği, beklentiler ve ülkemiz açısından önemi tartışılmıştır.Anahtar Kelimeler: Kuantum Kriptografi, Kuantum Anahtar Dağıtım Protokolleri, BB84, B92, SARG, Dolanıklık, Bell Eşitsizlikleri, Gizlilik Artırımı, Yan Kanallar. In the first part of this study cryptological terms and history of cryptology have been provided, various symmetrical and asymmetrical cryptographic systems have been defined and in these systems Vernam cipher theoretically proven by AT&T engineer Shannon that the system cannot be hacked if practiced properly has been examined in details. Absolute security provided by Vernam cryptographic system completely depends on randomly selected single use of the key?s confidentiality and the security of its distribution. But principally any of the classic private channels can passively be eavesdropped without its notice and may give the opportunity to change hands for the key which should be kept confidential. Here the quantum cryptography appears us as a key distribution technique where the problem is solved and the security of the key has been protected by physical rules. Although the securities of the classical cryptographic systems are based on the complication of the calculation of some mathematical problems, this technique depends on quantum mechanics. Principles of quantum mechanics assert that the corruption of the data transferred to the target from accurate transmission lines imply that the data has been tried to be read by an eavesdropper. In order to share equal key indexes hundred percent safely among the users by benefiting from this advantage, various key distribution protocols set forth such as BB84, B92, SARG, Ekert. The principals of those protocols are allowed in the 2nd part of the study.In the other parts of the study, in general, the studies following the achievement reached first in 1989 regarding key distribution experiment until today and the studies leading to the developments in this field have been looked through and information regarding light sources in QKD systems, detectors and quantum channels with the supporting procedures for correction of the errors originating from channel defects and privacy amplification have been provided, referred to quantum cryptography security in part 9 and the future of quantum cryptography, expectations and its importance regarding our country have been negotiated in tenth and the last part.Key Words: Quantum Cryptography, Quantum Key Distribution Protocols, BB84, B92, SARG, Entanglement, Bell Inequalities, Privacy Amplification, Side Channels. 108
- Published
- 2012
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.