Cryptography

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 80601 Experts worldwide ranked by ideXlab platform

Gerd Leuchs - One of the best experts on this subject based on the ideXlab platform.

  • device calibration impacts security of quantum key distribution
    Physical Review Letters, 2011
    Co-Authors: Nitin Jain, Christoffer Wittmann, Lars Lydersen, Carlos Wiechers, Dominique Elser, Christoph Marquardt, Vadim Makarov, Gerd Leuchs
    Abstract:

    The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. In particular, two parties can generate a random, secret key at a distance, even though an eavesdropper can do anything permitted by the laws of physics. Measuring the quantum properties of the signals generating the key, would ultimately change them, and thus reveal the eavesdropper’s presence. This exchange of a random, secret key is known as quantum Cryptography. Quantum Cryptography can be, and has been proven unconditionally secure using perfect devices. However, when quantum Cryptography is implemented, one must use components available with current technology. These are usually imperfect. Although the security of quantum Cryptography has been proven for components with certain imperfections, the question remains: can quantum Cryptography be implemented in a provable, unconditionally secure way, using components available with current technology? This thesis contains both a theoretical, and an experimental contribution to the answer of this question. On the experimental side, components used in, and complete quantum Cryptography systems have been carefully examined for security loopholes. In particular, it turned out that two commercial quantum Cryptography systems contained loopholes, which would allow an eavesdropper to capture the full secret key, without exposing her presence. Furthermore, this detector control attack could be implemented with current technology. The attack is applicable against a variety of quantum Cryptography implementations and protocols. The theoretical contribution consists of security proofs for quantum Cryptography in a very general setting. Precisely, the security is proven with arbitrary individual imperfections in the source and detectors. These proofs should make it possible to use a wide array of imperfect devices in implementations of quantum Cryptography. Finally, a secure detection scheme is proposed, immune to the detector control attack and compatible with those security proofs. Therefore, if this scheme is implemented correctly, it offers provable security.

Addepalli V N Krishna - One of the best experts on this subject based on the ideXlab platform.

  • quantum Cryptography and quantum key distribution protocols a survey
    International Conference on Advanced Computing, 2016
    Co-Authors: V Padamvathi, Vishnu B Vardhan, Addepalli V N Krishna
    Abstract:

    Quantum Cryptography renders a cryptographic solution which is imperishable as it fortifies prime secrecy that is applied to quantum public key distribution. It is a prominent technology wherein two entities can communicate securely with the sights of quantum physics. In classical Cryptography, bits are used to encode information where as quantum Cryptography i.e. quantum computer uses photons or quantum particles and photon's polarization which is their quantized properties to encode the information. This is represented in qubits which is the unit for quantum Cryptography. The transmissions are secure as it is depended on the inalienable quantum mechanics laws. The emphasis of this paper is to mark the rise of quantum Cryptography, its elements, quantum key distribution protocols and quantum networks.

Bethany Higgins - One of the best experts on this subject based on the ideXlab platform.

  • Public-key Cryptography and open systems interconnection
    IEEE Communications Magazine, 1992
    Co-Authors: Warwick Ford, Bethany Higgins
    Abstract:

    The role of public-key Cryptography in open systems interconnection (OSI) is discussed. A short tutorial introduction to public-key Cryptography is followed by a discussion of how security fits into the OSI architecture, and what standards are being developed in this area. The use being made of public-key Cryptography in the network layer and in the message handling system and directory application is also discussed

Nitin Jain - One of the best experts on this subject based on the ideXlab platform.

  • device calibration impacts security of quantum key distribution
    Physical Review Letters, 2011
    Co-Authors: Nitin Jain, Christoffer Wittmann, Lars Lydersen, Carlos Wiechers, Dominique Elser, Christoph Marquardt, Vadim Makarov, Gerd Leuchs
    Abstract:

    The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. In particular, two parties can generate a random, secret key at a distance, even though an eavesdropper can do anything permitted by the laws of physics. Measuring the quantum properties of the signals generating the key, would ultimately change them, and thus reveal the eavesdropper’s presence. This exchange of a random, secret key is known as quantum Cryptography. Quantum Cryptography can be, and has been proven unconditionally secure using perfect devices. However, when quantum Cryptography is implemented, one must use components available with current technology. These are usually imperfect. Although the security of quantum Cryptography has been proven for components with certain imperfections, the question remains: can quantum Cryptography be implemented in a provable, unconditionally secure way, using components available with current technology? This thesis contains both a theoretical, and an experimental contribution to the answer of this question. On the experimental side, components used in, and complete quantum Cryptography systems have been carefully examined for security loopholes. In particular, it turned out that two commercial quantum Cryptography systems contained loopholes, which would allow an eavesdropper to capture the full secret key, without exposing her presence. Furthermore, this detector control attack could be implemented with current technology. The attack is applicable against a variety of quantum Cryptography implementations and protocols. The theoretical contribution consists of security proofs for quantum Cryptography in a very general setting. Precisely, the security is proven with arbitrary individual imperfections in the source and detectors. These proofs should make it possible to use a wide array of imperfect devices in implementations of quantum Cryptography. Finally, a secure detection scheme is proposed, immune to the detector control attack and compatible with those security proofs. Therefore, if this scheme is implemented correctly, it offers provable security.

V Padamvathi - One of the best experts on this subject based on the ideXlab platform.

  • quantum Cryptography and quantum key distribution protocols a survey
    International Conference on Advanced Computing, 2016
    Co-Authors: V Padamvathi, Vishnu B Vardhan, Addepalli V N Krishna
    Abstract:

    Quantum Cryptography renders a cryptographic solution which is imperishable as it fortifies prime secrecy that is applied to quantum public key distribution. It is a prominent technology wherein two entities can communicate securely with the sights of quantum physics. In classical Cryptography, bits are used to encode information where as quantum Cryptography i.e. quantum computer uses photons or quantum particles and photon's polarization which is their quantized properties to encode the information. This is represented in qubits which is the unit for quantum Cryptography. The transmissions are secure as it is depended on the inalienable quantum mechanics laws. The emphasis of this paper is to mark the rise of quantum Cryptography, its elements, quantum key distribution protocols and quantum networks.