Quantum Cryptography with an Emphasis on the Security Analysis of QKD Protocols
Radhika Kavuri
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSanthosh Voruganti
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSheena Mohammed
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSucharitha Inapanuri
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorB. Harish Goud
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorRadhika Kavuri
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSanthosh Voruganti
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSheena Mohammed
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSucharitha Inapanuri
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorB. Harish Goud
Department of Information Technology, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad, India
Search for more papers by this authorSachi Nandan Mohanty
School of Computer Science & Engineering, VIT AP University, Amaravati, Andhra Pradesh, India
Search for more papers by this authorRajanikanth Aluvalu
Department of IT, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Search for more papers by this authorSarita Mohanty
Department of Computer Science, Odisha University of Agriculture & Technology, Bhubaneswar, India
Search for more papers by this authorSummary
Quantum computing is a fast-developing technology that uses the principles of quantum physics to solve issues that are too complicated for conventional computers. Even the most complex mathematical computations performed in conventional cryptographic algorithms can easily be hacked using quantum computers. Hence, cryptologists are recently looking into developing new quantum hard cryptographic algorithms that are secure against quantum computers. Quantum cryptography employs the inherent features of quantum physics in order to secure and transmit data in a way that cannot be intercepted. Quantum cryptography is emerging as a game changing technology in various domains including privacy preserving, secure online voting, banking, and manufacturing industries. This chapter covers basic terminology and concepts of quantum cryptography, trends in quantum cryptography, an in-depth overview of Quantum Key distribution protocols along with their vulnerabilities and future research foresights.
References
- Alvarez , D. and Kim , Y. , Survey of the development of quantum cryptography and its applications . 2021 IEEE 11th Annual Computing and Communication Workshop and Conference ( CCWC) , pp. 1074 – 1080 , 2021 .
- Jasoliya , H. and Shah , K. , An exploration to the quantum cryptography technology . 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) , pp. 506 – 510 , 2022 .
- Shor , P.W. , Algorithms for quantum computation: Discrete logarithms and factoringin , in: Proceedings 35th Annual Symposium on Foundations of Computer Science , pp. 124 – 134 , 1994 .
- Sehgal , S.K. and Gupta , R. , A comparative study of classical and quantum cryptography . 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) , pp. 869 – 873 , 2019 .
- Moizuddin , M. , Winston , J. , Qayyum , M. , A comprehensive survey: Quantum cryptography . 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) , pp. 98 – 102 , 2017 .
- Jain , A. , Khanna , A. , Bhatt , J. , Sakhiya , P.V. , Kumar , S. , Urdhwareshe , R.S. , Desai , N.M. , Development of NavIC synchronized fully automated inter-building QKD framework and demonstration of quantum secured video calling . Optik , 252 , 168438 , 2022 .
- Liao , S.K. et al ., Satellite-to-ground quantum key distribution . Nature , 549 , 43 – 47 , 2017 .
- Cao , Y. , Zhao , Y. , Wang , Q. , Zhang , J. , Ng , S.X. , Hanzo , L. , The evolution of quantum key distribution networks: On the road to the qinternet . IEEE Commun. Surv. Tutorials , 24 , 2 , 839 – 894 , 2022 .
- Kundu , N.K. , Dash , S.P. , Mckay , M.R. , Mallik , R.K. , Channel estimation and secret key rate analysis of MIMO terahertz quantum key distribution . IEEE Trans. Commun. , 70 , 5 , 3350 – 3363 , 2022 .
- D'Oliveira , R.G.L. , Cohen , A. , Robinson , J. , Stahlbuhk , T. , Médard , M. , Post-quantum security for ultra-reliable low-latency heterogeneous networks . MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM) , pp. 933 – 938 , 2021 .
-
Sharma , P.
,
Agrawal , A.
,
Bhatia , V.
,
Prakash , S.
,
Mishra , A.K.
,
Quantum key distribution secured optical networks: A survey
.
IEEE Open J. Commun. Soc.
,
2
,
2049
–
2083
,
2021
.
10.1109/OJCOMS.2021.3106659 Google Scholar
- Aji , A. , Jain , K. , Krishnan , P. , A survey of quantum key distribution (QKD) network simulation platforms . 2021 2nd Global Conference for Advancement in Technology (GCAT) , pp. 1 – 8 , 2021 .
- Zhang , H. , Ji , Z. , Wang , H. , Wu , W. , Survey on quantum information security . China Commun. , 16 , 10 , 1 – 36 , Oct. 2019 .
- Cao , Y. , Zhao , Y. , Wang , Q. , Zhang , J. , Ng , S.X. , Hanzo , L. , The evolution of quantum key distribution networks: On the road to the qinternet . IEEE Commun. Surv. Tutorials , 24 , 2 , 839 – 894 , Secondquarter 2022 .
- Padamvathi , V. , Vardhan , B.V. , Krishna , A.V.N. , Quantum cryptography and quantum key distribution protocols: A survey . 2016 IEEE 6th International Conference on Advanced Computing (IACC) , pp. 556 – 562 , 2016 .
- Fernández-Caramés , T.M. , From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things . IEEE Internet Things J. , 7 , 7 , 6457 – 6480 , July 2020 .
- Bennett , C.H. and Brassard , G. , Quantum cryptography: Public key distribution andcoin tossing . Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing , IEEE , pp. 175 – 179 , 1984 .
-
Cangea , O.
,
Oprina , C.S.
,
Dima , M.-O.
,
Implementing quantum cryptography algorithms for data security
.
ECAI 2016 - International Conference – 8th Edition Electronics, Computers and Artificial Intelligence
,
Ploiesti, Romania
, 30 June -02 July,
2016
.
10.1109/ECAI.2016.7861116 Google Scholar
- Bechmann-Pasquinucci , H. and Gisin , N. , Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography . Phys. Rev. A , 59 , 4238 – 4248 , 1999 .
- Scarani , V. et al ., Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations . Phys. Rev. Lett. , 92 , 5 , 057901 , 2004 .
-
Lütkenhaus , N.
and
Jahma , M.
,
Quantum key distribution with realistic states: Photon-number statistics in the photon-number splitting attack
.
New J. Phys.
,
4
,
1
,
44
,
2002
.
10.1088/1367-2630/4/1/344 Google Scholar
- Ma , X. , Fung , C.-H.F. , Lo , H.-K. , Quantum key distribution with entangled photon sources . Phys. Rev. A , 76 , 012307 , 2007 .
- Kaszlikowski , D. , Oi , D. , Christandl , M. , Chang , K. , Ekert , A. , Kwek , L. , Oh , C. , Quantum cryptography based on qutrit Bell inequalities . Phys. Rev. A , 67 , 012310 , Published 21 January 2003 .
- Bennett , C.H. , Brassard , G. , Mermin , N.D. , Quantum cryptography without Bell's theorem . Phys. Rev. Lett. , 68 , 557 , 1992 .
- Houshmand , M. and Hosseini-Khayat , S. , An_entanglemen based quantum key distribution protocols . 8th International ISC Conference on Information Security and Cryptology , 27 October 2011 .
- Bruss , D. , Erdelyti , G. , Meyer , T. , Riege , T. , Rothe , J. , Quantum cryptography: A survey . ACM Comput. Surv. , 39 , 2 , 27 pages, Article 6, June 2007 .
- Haitjema , M. , A survey of the prominent quantum key distribution protocols , December 2, 2007 .
- Gupta , B.M. , Dhawan , S. , Mamdapur , G.M. , Quantum cryptography research: A scientometric assessment of global publications during 1992-2019 . Sci. Technol. Lib. , 40 , 1 – 19 , 2021 .
- Chen , Y.A. , Zhang , Q. , Chen , T.Y. , Cai , W.Q. , Liao , S.K. , Zhang , J. , Chen , K. , Yin , J. , Ren , J.G. , Chen , Z. , Han , S.L. , An integrated space-to-ground quantum communication network over 4,600 kilometres . Nature , 589 , 7841 , 214 – 219 , 2021 .