Multi-photon Quantum Secure Communication

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment.

Author(s): Pramode K. Verma; Mayssaa El Rifai; Kam Wai Clifford Chan
Publisher: Springer
Year: 2018

Language: English
Pages: 214

Preface
Acknowledgements
Contents
List of Figures
1 Introduction
1.1 Cryptography
1.1.1 Short History
1.1.2 Classical Cryptography Limitations
1.1.3 Quantum Cryptography as a Solution
1.2 Quantum Cryptography
1.3 Quantum World
1.3.1 Polarization Concept
1.3.2 Quantum Cryptography
1.4 Post-quantum Cryptography
1.4.1 Lattice-Based Cryptography
1.4.2 Multivariate Cryptography
1.4.3 Hash-Based Cryptography
1.4.4 Code-Based Cryptography
1.5 Scope and Contributions of This Book
1.6 Organization of This Book
References
2 Mathematical Background
2.1 Basic Concepts in Quantum Information
2.1.1 Quantum State and Qubit
2.1.2 Multiple Qubits
2.1.3 Qubit Operations
2.1.4 Mixed States and Density Operators
2.1.5 No-Cloning Theorem
2.1.6 Quantum Measurement
2.2 Quantum Theory of Photons
2.2.1 Quantization of Electromagnetic Field
2.2.2 Photon States
2.2.3 Representing Qubit Using Polarization States of a Photon
2.2.4 Multi-photon Polarization States and Stokes Vector
2.2.5 Polarization Rotation and Mueller Matrices for Multi-photon States
2.3 Summary
References
3 Quantum Key Distribution
3.1 Introduction
3.2 Single Photon-Based QKD Protocols
3.2.1 The BB84 Protocol
3.2.2 The B92 Protocol
3.3 Use of Weak Coherent States in QKD
3.3.1 Photon-Number-Splitting Attack
3.3.2 The SARG04 Protocol
3.3.3 The Decoy-State Method
3.3.4 The COW Protocol
3.4 Entangled Photon-Based QKD Protocol
3.4.1 Quantum Entanglemententangled state and Bell’s Inequality
3.4.2 The E91 Protocol
3.5 Challenges of Current Approaches of QKD
3.6 Summary
References
4 Secure Communication Based on Quantum Noise
4.1 Introduction
4.2 Keyed Communication in Quantum Noise (KCQ)
4.2.1 KCQ Coherent-State Key Generation with Binary Detection
4.2.2 Current Experimental Status
4.2.3 Comparison Between QKD and KCQ
4.3 Security Analysis of KCQ
4.3.1 Information-Theoretic (IT) Security
4.3.2 Complexity-Theoretic (CT) Security
4.4 Summary
References
5 The Three-Stage Protocol: Its Operation and Implementation
5.1 Introduction
5.2 Principle of Operation
5.3 Implementation of the Three-Stage Protocol Over Free Space Optics (FSO)
5.3.1 Rotation Transformations
5.3.2 Half Wave Plate Operation
5.3.2.1 Choice of the Rotation Angle
5.4 Summary
References
6 The Multi-stage Protocol
6.1 Introduction
6.2 The Multi-stage Protocol Polarization Hopping
6.2.1 Comparison with Single-Photon Protocols
6.3 Man-in-the-Middle Attack
6.4 Key/Message Expansion Multi-stage Protocol
6.4.1 Multi-stage Protocol Using an Initialization Vector
6.4.2 Operation of the Four-Variables Three-Stage Protocol
6.4.3 Implementation of the Four-Variables Three-Stage Protocol
6.5 Summary
References
7 Preliminary Security Analysis of the Multi-stage Protocol
7.1 Introduction
7.2 Background Knowledge
7.2.1 Helstrom Discrimination
7.3 Photon Number Splitting Attack (PNS)
7.3.1 Helstrom Discrimination
7.3.2 Fock States
7.4 Trojan Horse Attack
7.5 Hardware Countermeasures
7.6 Conclusion
References
8 Security Analysis of the Multi-stage Protocol
8.1 Introduction
8.2 Intercept-Resend (IR) and Photon Number Splitting (PNS) Attacks
8.3 Authentication
8.4 Amplification Attack
8.5 Security and Key Rate Efficiency
8.6 Summary
References
9 Application of the Multi-stage Protocol in IEEE 802.11i
9.1 Introduction
9.2 IEEE 802.11i
9.2.1 The Four-Way Handshake
9.3 Integration of QKD for Key Distribution in IEEE 802.11i
9.3.1 Disadvantages of the Approach Described to Integrate QKD into IEEE 802.11i
9.4 Hybrid Three-Stage Protocol
9.4.1 Quantum Handshake Using the Three-Stage Protocol
9.4.2 Quantum Handshake Using the Four-Variable Three-Stage Protocol
9.4.3 Quantum Handshake Using the Single-Stage Protocol
9.4.4 Hardware Implementation
9.5 Software Implementation
9.5.1 Multi-agent Approach in BB84
9.5.2 Multi-agent Approach in Multi-photon Tolerant Protocols
9.5.3 Analysis of the Quantum Handshake Using Three-Stage Protocol and Its Variants
9.6 Summary
References
10 Intrusion Detection on Optical Fibers
10.1 Intrusion Detection and Encryption
10.2 Tapping of Optical Fibers
10.3 Polarization Properties of Light [1]
10.4 Experimental Setup
10.5 Experimental Results
10.6 Real-Life Applications of the Intrusion Detection System
10.7 Summary
References
11 Secure Key Transfer Over the Polarization Channel
11.1 Symmetric Key Encryption
11.2 The Advanced Encryption System
11.3 A Review of the Polarization Properties of Light
11.4 Polarization Transfer Function and Fiber Characterization
11.5 The System
11.5.1 Method of Implementation
11.6 Experimental Results
11.7 Data Rate and Calibration Time
11.8 Summary
References
12 An Ultra-Secure Router-to-Router Key Exchange System
12.1 Introduction
12.2 Related Work
12.2.1 Discrete Logarithms
12.2.2 Contemporary Key Distribution Protocols
12.3 The Proposed Protocol
12.3.1 Multi-stage Protocol
12.3.2 Man in the Middle Attack on Multi-stage Protocols
12.4 Proposed Protocol Using an Initialization Vector and Its Cryptographic Strength
12.4.1 Description
12.4.2 Mode of Operation
12.4.3 A Two-Stage Protocol
12.4.4 Braiding Concept
12.4.5 Man in the Middle Attack on a Multi-stage Protocol Using an Initialization Vector
12.4.6 Characteristics of the Proposed Protocol
12.5 Alternatives to the Proposed Approach
12.5.1 Alternative I—RSA
12.5.2 Alternative II—AES
12.5.3 Alternative III—ECC
12.6 Summary
References