|
|
1 | (28) |
|
|
1 | (13) |
|
|
2 | (9) |
|
1.1.2 Classical Cryptography Limitations |
|
|
11 | (2) |
|
1.1.3 Quantum Cryptography as a Solution |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (6) |
|
1.3.1 Polarization Concept |
|
|
15 | (2) |
|
1.3.2 Quantum Cryptography |
|
|
17 | (3) |
|
1.4 Post-quantum Cryptography |
|
|
20 | (3) |
|
1.4.1 Lattice-Based Cryptography |
|
|
20 | (1) |
|
1.4.2 Multivariate Cryptography |
|
|
21 | (1) |
|
1.4.3 Hash-Based Cryptography |
|
|
22 | (1) |
|
1.4.4 Code-Based Cryptography |
|
|
22 | (1) |
|
1.5 Scope and Contributions of This Book |
|
|
23 | (1) |
|
1.6 Organization of This Book |
|
|
24 | (1) |
|
|
25 | (4) |
|
2 Mathematical Background |
|
|
29 | (30) |
|
2.1 Basic Concepts in Quantum Information |
|
|
29 | (15) |
|
2.1.1 Quantum State and Qubit |
|
|
29 | (4) |
|
|
33 | (3) |
|
|
36 | (2) |
|
2.1.4 Mixed States and Density Operators |
|
|
38 | (2) |
|
|
40 | (1) |
|
2.1.6 Quantum Measurement |
|
|
41 | (3) |
|
2.2 Quantum Theory of Photons |
|
|
44 | (13) |
|
2.2.1 Quantization of Electromagnetic Field |
|
|
44 | (4) |
|
|
48 | (3) |
|
2.2.3 Representing Qubit Using Polarization States of a Photon |
|
|
51 | (1) |
|
2.2.4 Multi-photon Polarization States and Stokes Vector |
|
|
52 | (3) |
|
2.2.5 Polarization Rotation and Mueller Matrices for Multi-photon States |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (2) |
|
3 Quantum Key Distribution |
|
|
59 | (26) |
|
|
59 | (1) |
|
3.2 Single Photon-Based QKD Protocols |
|
|
60 | (5) |
|
|
61 | (3) |
|
|
64 | (1) |
|
3.3 Use of Weak Coherent States in QKD |
|
|
65 | (10) |
|
3.3.1 Photon-Number-Splitting Attack |
|
|
66 | (3) |
|
3.3.2 The SARG04 Protocol |
|
|
69 | (1) |
|
3.3.3 The Decoy-State Method |
|
|
70 | (3) |
|
|
73 | (2) |
|
3.4 Entangled Photon-Based QKD Protocol |
|
|
75 | (6) |
|
3.4.1 Quantum Entanglement and Bell's Inequality |
|
|
76 | (4) |
|
|
80 | (1) |
|
3.5 Challenges of Current Approaches of QKD |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (3) |
|
4 Secure Communication Based on Quantum Noise |
|
|
85 | (12) |
|
|
85 | (1) |
|
4.2 Keyed Communication in Quantum Noise (KCQ) |
|
|
86 | (5) |
|
4.2.1 KCQ Coherent-State Key Generation with Binary Detection |
|
|
87 | (2) |
|
4.2.2 Current Experimental Status |
|
|
89 | (1) |
|
4.2.3 Comparison Between QKD and KCQ |
|
|
90 | (1) |
|
4.3 Security Analysis of KCQ |
|
|
91 | (2) |
|
4.3.1 Information-Theoretic (IT) Security |
|
|
91 | (2) |
|
4.3.2 Complexity-Theoretic (CT) Security |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (3) |
|
5 The Three-Stage Protocol: Its Operation and Implementation |
|
|
97 | (8) |
|
|
97 | (1) |
|
5.2 Principle of Operation |
|
|
97 | (2) |
|
5.3 Implementation of the Three-Stage Protocol Over Free Space Optics (FSO) |
|
|
99 | (4) |
|
5.3.1 Rotation Transformations |
|
|
101 | (1) |
|
5.3.2 Half Wave Plate Operation |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
103 | (2) |
|
6 The Multi-stage Protocol |
|
|
105 | (14) |
|
|
105 | (1) |
|
6.2 The Multi-stage Protocol Polarization Hopping |
|
|
106 | (3) |
|
6.2.1 Comparison with Single-Photon Protocols |
|
|
108 | (1) |
|
6.3 Man-in-the-Middle Attack |
|
|
109 | (4) |
|
6.4 Key/Message Expansion Multi-stage Protocol |
|
|
113 | (3) |
|
6.4.1 Multi-stage Protocol Using an Initialization Vector |
|
|
113 | (1) |
|
6.4.2 Operation of the Four-Variables Three-Stage Protocol |
|
|
113 | (2) |
|
6.4.3 Implementation of the Four-Variables Three-Stage Protocol |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
117 | (2) |
|
7 Preliminary Security Analysis of the Multi-stage Protocol |
|
|
119 | (12) |
|
|
119 | (1) |
|
|
120 | (2) |
|
7.2.1 Helstrom Discrimination |
|
|
120 | (2) |
|
7.3 Photon Number Splitting Attack (PNS) |
|
|
122 | (5) |
|
7.3.1 Helstrom Discrimination |
|
|
123 | (2) |
|
|
125 | (2) |
|
|
127 | (1) |
|
7.5 Hardware Countermeasures |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (2) |
|
8 Security Analysis of the Multi-stage Protocol |
|
|
131 | (12) |
|
|
131 | (1) |
|
8.2 Intercept-Resend (IR) and Photon Number Splitting (PNS) Attacks |
|
|
132 | (3) |
|
|
135 | (3) |
|
|
138 | (1) |
|
8.5 Security and Key Rate Efficiency |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (3) |
|
9 Application of the Multi-stage Protocol in IEEE 802.11i |
|
|
143 | (18) |
|
|
143 | (1) |
|
|
144 | (2) |
|
9.2.1 The Four-Way Handshake |
|
|
144 | (2) |
|
9.3 Integration of QKD for Key Distribution in IEEE 802.11i |
|
|
146 | (3) |
|
9.3.1 Disadvantages of the Approach Described to Integrate QKD into IEEE 802.11i |
|
|
148 | (1) |
|
9.4 Hybrid Three-Stage Protocol |
|
|
149 | (4) |
|
9.4.1 Quantum Handshake Using the Three-Stage Protocol |
|
|
150 | (1) |
|
9.4.2 Quantum Handshake Using the Four-Variable Three-Stage Protocol |
|
|
150 | (1) |
|
9.4.3 Quantum Handshake Using the Single-Stage Protocol |
|
|
151 | (1) |
|
9.4.4 Hardware Implementation |
|
|
152 | (1) |
|
9.5 Software Implementation |
|
|
153 | (5) |
|
9.5.1 Multi-agent Approach in BB84 |
|
|
153 | (3) |
|
9.5.2 Multi-agent Approach in Multi-photon Tolerant Protocols |
|
|
156 | (1) |
|
9.5.3 Analysis of the Quantum Handshake Using Three-Stage Protocol and Its Variants |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (2) |
|
10 Intrusion Detection on Optical Fibers |
|
|
161 | (12) |
|
10.1 Intrusion Detection and Encryption |
|
|
161 | (1) |
|
10.2 Tapping of Optical Fibers |
|
|
162 | (1) |
|
10.3 Polarization Properties of Light [ 1] |
|
|
163 | (1) |
|
|
164 | (2) |
|
10.5 Experimental Results |
|
|
166 | (3) |
|
10.6 Real-Life Applications of the Intrusion Detection System |
|
|
169 | (2) |
|
|
171 | (1) |
|
|
171 | (2) |
|
11 Secure Key Transfer Over the Polarization Channel |
|
|
173 | (20) |
|
11.1 Symmetric Key Encryption |
|
|
173 | (2) |
|
11.2 The Advanced Encryption System |
|
|
175 | (1) |
|
11.3 A Review of the Polarization Properties of Light |
|
|
176 | (2) |
|
11.4 Polarization Transfer Function and Fiber Characterization |
|
|
178 | (6) |
|
|
184 | (4) |
|
11.5.1 Method of Implementation |
|
|
184 | (4) |
|
11.6 Experimental Results |
|
|
188 | (2) |
|
11.7 Data Rate and Calibration Time |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
191 | (2) |
|
12 An Ultra-Secure Router-to-Router Key Exchange System |
|
|
193 | |
|
|
193 | (2) |
|
|
195 | (2) |
|
12.2.1 Discrete Logarithms |
|
|
195 | (1) |
|
12.2.2 Contemporary Key Distribution Protocols |
|
|
196 | (1) |
|
12.3 The Proposed Protocol |
|
|
197 | (4) |
|
12.3.1 Multi-stage Protocol |
|
|
198 | (1) |
|
12.3.2 Man in the Middle Attack on Multi-stage Protocols |
|
|
199 | (2) |
|
12.4 Proposed Protocol Using an Initialization Vector and Its Cryptographic Strength |
|
|
201 | (7) |
|
|
201 | (1) |
|
|
202 | (2) |
|
12.4.3 A Two-Stage Protocol |
|
|
204 | (1) |
|
|
205 | (1) |
|
12.4.5 Man in the Middle Attack on a Multi-stage Protocol Using an Initialization Vector |
|
|
206 | (1) |
|
12.4.6 Characteristics of the Proposed Protocol |
|
|
207 | (1) |
|
12.5 Alternatives to the Proposed Approach |
|
|
208 | (4) |
|
12.5.1 Alternative I---RSA |
|
|
208 | (2) |
|
12.5.2 Alternative II---AES |
|
|
210 | (1) |
|
12.5.3 Alternative III---ECC |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | |