Quantum Key Distribution (QKD) for Symmetric Key Transfer
DOI:
https://doi.org/10.32628/CSEIT24103105Keywords:
Quantum Cryptography, Quantum Key Distribution, Quantum Computation, Symmetric Key, QKD with Sudoku Key, CryptographyAbstract
Classical cryptographic systems are increasingly challenged by advances in computing power and new algorithmic techniques, particularly with the rise of quantum computing, which threatens the security of current encryption methods. This has spurred interest in quantum-resistant cryptography, aimed at creating algorithms that can withstand attacks from quantum computers. Traditionally, secure key transport over alternate channels has been a significant challenge, but quantum mechanics offers a solution. Quantum Key Distribution (QKD) is a revolutionary method for secure communication that leverages quantum principles. Unlike traditional methods, QKD provides unconditional security, with key security ensured by the laws of physics rather than computational difficulty. The BB84 protocol, introduced in 1984 by Bennett and Brassard, is a leading QKD scheme known for its simplicity and effectiveness in generating eavesdropping-resistant cryptographic keys. It facilitates secure key transport over alternate channels. This documentation aims to advance QKD security by practically implementing and analyzing the BB84 protocol. Through detailed theoretical analysis, simulation studies, and experimental validation, the practical impacts, and limitations of BB84-based QKD systems are examined. Additionally, a practical implementation of quantum key distribution using a sudoku key demonstrates the process's simplicity and effectiveness. These findings are expected to pave new paths in the field of cryptanalysis in the emerging Quantum Age.
Downloads
References
C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175, page 8. New York, 1984.
Michael A. Nielsen, Isaac L. Chuang, 2000, Quantum Computation and Quantum Information, Cambridge University Press( ISBN 978-1-107-00217-3)
https://www.quantum-inspire.com/kbase/what-is-a-qubit/ (last visited: 04.04.2024)
https://www.britannica.com/science/polarization-physics (last visited: 03.04.2024)
Lai J, Yao F, Wang J, Zhang M, Li F, Zhao W, Zhang H. Application and Development of QKD-Based Quantum Secure Communication. Entropy (Basel). 2023 Apr 6;25(4):627. doi:10.3390/e25040627. PMID: 37190415; PMCID: PMC10138083. DOI: https://doi.org/10.3390/e25040627
S. Singh. The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography, Doubleday, New York, USA, 1st edition, 1999.
https://docs.quantum.ibm.com/api/qiskit/qiskit.circuit.library.XGate (last visited: 02.04.2024)
https://docs.quantum.ibm.com/api/qiskit/qiskit.circuit.library.HGate (last visited: 02.04.2024)
https://heqa-sec.com/blog/quantum-cryptography-in-real-world-applications/#:~:text=QKD%20allows%20the%20two%20communicating,detects%20any%20attempts%20at%20spying. (last visited: 04.04.2024)
C. Chang, Y. Chou, and T. D. Kieu. “An information hiding scheme using Sudoku”, ICICIC ’08: Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, p. 17, Washington, DC, USA, 2008. DOI: https://doi.org/10.1109/ICICIC.2008.149
S. Gupta. Some results on Su Doku. http://theory.tifr.res.in/~sgupta/sudoku/theorems.pdf (March 2006)
https://www.nature.com/articles/npjqi201625#Sec6 (last visited: 04.04.2024)
Fei Gao, Bin Liu, Qiao-Yan Wen, and Hui Chen, Flexible quantum private queries based on quantum key distribution, Opt. Express 20, 17411-17420 (2012), https://doi.org/10.1364/OE.20.017411 DOI: https://doi.org/10.1364/OE.20.017411
Sasirekha, N., & Hemalatha, M. Quantum Cryptography using Quantum Key Distribution and its Applications. International Journal of Computer Applications, 101(18), 31-36,2014
Dwaipayan Bhoumick, Asoke Nath,”Fundamentals of Quantum Computing : A Comprehensive Study from Scrodinger Wave Equation to Quantum States”, International Journal of Innovative Research in Technology(IJIRT), ISSN:2349-6002, UGC Approved No. 47859, Vol. 9, Issue 6, Page:76-87,Nov(2022).
Debrup Roy Chowdhury, Asoke Nath, “Introduction to Quantum Gates: A comprehensive Study on Quantum Information”, International Journal of Innovative Research in Technology(IJIRT), ISSN:2349-6002, UGC Approved No. 47859, Vol. 9, Issue 6, Page:433-441,Nov(2022)
Debayan Bhoumick, Debottam Mitra, Debrup Roy Chowdhury and Asoke Nath,”A Comprehensive Study on Implementation of Grover’s Search Algorithm on Quantum Processors”, International Journal of Advance Research in Computer Science and Management Studies(IJARCSMS), ISSN : 2321-7782(Online), ISSN:2347-1778(Print), Impact Factor : 7.529, Vol. 11, Issue-5, Page 10-19, May 2023
Pastushenko VA, Kronberg DA. Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data. Entropy. 2023; 25(6):956. https://doi.org/10.3390/e25060956 DOI: https://doi.org/10.3390/e25060956
Zapatero, V., van Leent, T., Arnon-Friedman, R. et al. Advances in device-independent quantum key distribution. npj Quantum Inf 9, 10 (2023). https://doi.org/10.1038/s41534-023-00684-x DOI: https://doi.org/10.1038/s41534-023-00684-x
Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem, Quantum Key Distribution: Simulation and Characterizations, Procedia Computer Science, Volume 65, 2015, Pages 701-710, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2015.09.014. DOI: https://doi.org/10.1016/j.procs.2015.09.014
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.