Applied Quantum CryptographyChristian Kollmitzer, Mario Pivk Springer Science & Business Media, 2010 M02 28 - 230 pages Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography – or better Quantum Key Distribution – was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone toward a QKD technology was a large research and dev- opment project funded by the European Commission that aimed at combining qu- tum physics with complementary technologies that are necessary to create a tech- cal solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future cryptography. |
Contents
to 1 Introduction | 1 |
to 2 Preliminaries | 3 |
to 3 Quantum Key Distribution | 23 |
to 4 Adaptive Cascade | 48 |
to 5 Attack Strategies on QKD Protocols | 71 |
to 6 QKD Systems | 96 |
Other editions - View all
Common terms and phrases
algorithm Alice and Bob Alice Eve Alice's application attack strategy basis BB84 protocol block block-size Bob's boxplot Brassard Cascade class of hash client A.1 client B.2 coherent collision probability communication parties computational correlation data set detection detector encryption error correction error rate Eve's fiber Freespace Gisin GLMM Global radiation hash functions homodyne detection Humidity initiator key material key rate Key Store laser length Lett log2 matrix measurement Median module node number of errors parameter photons Phys Point of Trust Poisson process polarization privacy amplification public channel Q3P link QKD network QKD protocol QKD system QR codes quantum channel quantum cryptography quantum key distribution qubits reconciliation Renyi entropy request result SECOQC secret key Sect secure communication sends setup Shannon entropy sifted key signal storage client Stream string Sunshine duration Temperature transmission transmitted Trust Zone vector Weak Pulse System