CFP last date
22 April 2024
Reseach Article

To Discover Vulnerabilities of Quantum Cryptography in Secure Optical Data Transport

Published on November 2012 by Sandeep Kumar, Shomil Bansal
Issues and Challenges in Networking, Intelligence and Computing Technologies
Foundation of Computer Science USA
ICNICT - Number 3
November 2012
Authors: Sandeep Kumar, Shomil Bansal
3089a41a-c66d-4890-9227-8f3c8068c6e4

Sandeep Kumar, Shomil Bansal . To Discover Vulnerabilities of Quantum Cryptography in Secure Optical Data Transport. Issues and Challenges in Networking, Intelligence and Computing Technologies. ICNICT, 3 (November 2012), 17-22.

@article{
author = { Sandeep Kumar, Shomil Bansal },
title = { To Discover Vulnerabilities of Quantum Cryptography in Secure Optical Data Transport },
journal = { Issues and Challenges in Networking, Intelligence and Computing Technologies },
issue_date = { November 2012 },
volume = { ICNICT },
number = { 3 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 17-22 },
numpages = 6,
url = { /specialissues/icnict/number3/9031-1044/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Issues and Challenges in Networking, Intelligence and Computing Technologies
%A Sandeep Kumar
%A Shomil Bansal
%T To Discover Vulnerabilities of Quantum Cryptography in Secure Optical Data Transport
%J Issues and Challenges in Networking, Intelligence and Computing Technologies
%@ 0975-8887
%V ICNICT
%N 3
%P 17-22
%D 2012
%I International Journal of Computer Applications
Abstract

The last two decades have witnessed an exciting advanced research field that stems from non-classical atomic theory, the quantum mechanics. This research promises an interesting applicability in computation known as quantum computation, and also in secure data communications, known as quantum cryptography Quantum cryptography capitalizes on the inherent random polarization state of single photons, which are associated with binary logic values. Because the polarization state of a photon is not reproducible by an eavesdropper between the source and the destination polarized photons are used with an intelligent algorithm to disseminate the cryptographic key with high security from he source to the destination, a process known as quantum key distribution. However, although the polarization state of a photon remains intact in free- space propagation, it does not remain so in dielectric medium and thus quantum cryptography is not problem- free. In this paper we review quantum cryptography and we identify the various steps in the quantum key identification process. We then analyze and discuss issues related to quantum key distribution that rise in pragmatic fiber-optic transmission and in communication network topologies. In addition, we identify a major weakness of the method that is prone to attacking and which incapacitates quantum cryptography in fiber communications.

References
  1. A. Yu. Kitaev, A. H. Shen, and M. N. Vyalyi, Classical Quantum Computation, American Mathematical Society, Providence, RI, 2
  2. G. Benenti, and G. Casatti, Principles of Quantum Computation, vol I: Basic Concepts World Scientific Publishing, New Jersey, 2004
  3. S. J. Lomonaco, Jr. , editor, Quantum Computation: A Grand Mathematical Challenge for the Twenty-First Century and the Millenium American Mathematical Society, Providence, RI, 2002
  4. D. Deutch, "Quantum computational networks", Proceedings of the Royal Society of London vol. 425, pp. 73-90, 1989.
  5. Tombesi and O. Hirota, editors, "Quantum Communication, Computing and Measurement3",Kluwer Academic/Plenum Publishers, New York, 2001.
  6. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography", Rev. Mod Phys. vol. 74, pp. 145-195, 2002.
  7. D. S. Naik, C. G. Peterson, A. G. White, A. J. Berglund, and P. G. Kwiat, "Entangled state quantum cryptography: eavesdropping on the Ekert protocol", Phys. Rev. Lett. , vol. 84, pp. 4733-4736, 2000.
  8. P. Trojek, C. Schmid, M. Bourennane, H. Weinfurter, and C. Kurtsiefer, "Compact sources of polarization-entangled photon", Opt. Express, vol. 12, pp. 276-281, 2004.
  9. D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, "Quantum key distribution over 67 km with a plug & play system", New J. Phys, vol. 4, 41. 1-41. 8, 2002.
  10. G. Stix, "Best-Kept Secrets", Scientific American, January 2005, pp. 79-83.
  11. J. Ouellette, "Quantum Key Distribution", The Industrial Physicist , December 2004/January 2005, pp.
  12. S. V. Kartalopoulos, DWDM: Networks, Devices and Technology Chapter 1, Wiley/IEEE Press, 2003.
  13. X. Li, "A quantum key distribution protocol without classical communication", quant- ph/020950, September 6, 2002.
  14. K. Bostroem and T. Felbinger, "Ping-pong coding", quant-ph/020940, September 5, 2002.
  15. Q-Y. Cai, "Deterministic Secure Direct Communication Using Ping-pong Protocol without Public Channel", quant-ph/0301048, January 13, 2003.
  16. D. R. Kuhn, "Vulnerabilities in Quantum Key Distribution Protocols", quant-ph/0305076, May 12, 2003.
  17. A. Poppe, et al. , "Practical Quantum Key Distribution with Polarization Entangled Photons", quant-ph/0404115, April 23, 2004.
  18. S. V. Kartalopoulos, " Fault Detectability in DWDM ", Wiley/IEEE Press, 2000.
  19. S. V. Kartalopoulos, "A Global Multi Satellite Network", US patent 5,602,838, 2/11/1997.
  20. S. V. Kartalopoulos, "A Global Multi-satellite Network", Proceedings of the ICC'97 Conference, Montreal, Canada, 1997, pp. 699-698.
Index Terms

Computer Science
Information Sciences

Keywords

Vulnerabilities Quantum