Skip to main content

2019 | Buch

Multi-photon Quantum Secure Communication

verfasst von: Prof. Dr. Pramode K. Verma, Dr. Mayssaa El Rifai, Prof. Kam Wai Clifford Chan

Verlag: Springer Singapore

Buchreihe : Signals and Communication Technology

insite
SUCHEN

Über dieses Buch

This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
This chapter offers a brief history of cryptography and reviews the classical and contemporary methods of securing information.
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 2. Mathematical Background
Abstract
This chapter gives the mathematical background necessary for understanding quantum mechanics used in the rest of the book. The abstract concept of a qubit as the quantum extension of a classical bit is first introduced. Characteristics of photons are then covered to lay the foundation for the multi-photon communication. An exposition of the polarization degree of freedom of photons in the multi-photon regime is made.
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 3. Quantum Key Distribution
Abstract
Conventional implementations of cryptography are only computationally secure. The security of quantum cryptography (QC), on the other hand, is based on the inherent uncertainty in quantum phenomena at the physical layer of a communication system.
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 4. Secure Communication Based on Quantum Noise
Abstract
Advantage creation through intrusion-level detection used by BB84-based QKD protocols is only one possibility permitted by quantum effects. In the early 2000s, another class of quantum cryptography protocols, called keyed communication in quantum noise (KCQ) based on quantum detection and communication theory, was proposed. A main advantage of the KCQ protocols is that they generally allow the use of hundreds or thousands of photons in a signal pulse in contrast to the nominally single photon per pulse in BB84-based QKD protocols. This chapter introduces the concept of KCQ and describes certain implementations of the KCQ protocol.
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 5. The Three-Stage Protocol: Its Operation and Implementation
Abstract
This chapter introduces the three-stage multi-photon protocol, its operation and implementation in a laboratory environment. The implementation uses free-space optics as the transmission medium. Parts of this chapter are based on the authors’ work previously reported in [1].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 6. The Multi-stage Protocol
Abstract
This chapter generalizes the three-stage protocol into a family of multi-stage protocols. It compares the multi-stage protocol with single-photon protocols and illustrates how a multi-photon protocol can be made secure against man-in-the-middle attack. Since a multi-photon protocol is, in general, subject to photon-siphoning attacks, the protocol introduces another variable to thwart such attacks. Parts of this chapter are based on the authors’ work previously reported in [13].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 7. Preliminary Security Analysis of the Multi-stage Protocol
Abstract
This chapter presents a security analysis of the multi-stage protocol assessing its vulnerability to known security attacks. It shows that the multi-stage protocol can offer quantum level security under certain conditions. The material presented in this chapter is based on the authors’ work previously published in [12, 13].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 8. Security Analysis of the Multi-stage Protocol
Abstract
This chapter analyzes intercept-and-resend and photon number splitting attacks in the multi-stage multi-photon protocol. It lays down the conditions under which the multi-stage multi-photon protocol can approach the strength of a quantum-secure protocol. The material presented in this chapter is based on the authors’ work previously published in [16].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 9. Application of the Multi-stage Protocol in IEEE 802.11i
Abstract
This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE 802.11i protocol.
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 10. Intrusion Detection on Optical Fibers
Abstract
This chapter discusses an application of the polarization property of light in detecting intrusion on an optical fiber with the objective of stealing information flowing through it. Detection of intrusion, if timely accomplished, will offer an effective means to prevent information from being captured by a malicious agent. The material presented in this chapter is based on the authors’ work previously published in [1].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 11. Secure Key Transfer Over the Polarization Channel
Abstract
Preceding chapters of the book have explored using the polarization channel of an optical fiber for transmitting secure information without the need for encryption keys. In addition, Chap. 10 has offered a means to use the polarization channel for detecting any malicious attempt to pilfer information in transit over an optical fiber. This chapter introduces the use of the polarization channel of an optical fiber to transfer data; more specifically, exchange symmetric keys between the two ends of the optical fiber. Use of the symmetric keys will allow any conventional symmetric encryption to take place between any number of data channels supported by the optical fiber. We do note that any encryption based on symmetric keys can be only computationally secure but, since the keys can be exchanged at a rapid rate, we can still achieve a high level of security on the data channel. Parts of this chapter have been previously published in [7, 8].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Chapter 12. An Ultra-Secure Router-to-Router Key Exchange System
Abstract
This chapter presents an ultra-secure router-to-router key exchange system. The key exchange process can be initiated by either router at will and can be carried out as often as required. The cryptographic strength of the proposed protocols lies in the use of multi-stage transmission where the number of variables exceeds the number of stages by one, ensuring that the number of possible measurements is one less that the number of variables. The proposed system carries out all processing in electronics and is not vulnerable to the man in the middle attack. The treatment presented in this chapter is based on the authors’ work in [1, 2].
Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan
Metadaten
Titel
Multi-photon Quantum Secure Communication
verfasst von
Prof. Dr. Pramode K. Verma
Dr. Mayssaa El Rifai
Prof. Kam Wai Clifford Chan
Copyright-Jahr
2019
Verlag
Springer Singapore
Electronic ISBN
978-981-10-8618-2
Print ISBN
978-981-10-8617-5
DOI
https://doi.org/10.1007/978-981-10-8618-2

Neuer Inhalt