Font Size: a A A

The Generation Of Gaussian Random Number With FPGA And It's Application On Quantum Cryptography

Posted on:2007-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:L Z WangFull Text:PDF
GTID:2178360185481104Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
With the developing of the Information time, the security of the information system is more and more important for people. It is simulated that the Reverse Reconciliation Gaussian-moduled quantum key distributed Protocol (Abr. to RR) in this paper. Gaussian random modulation and public discussion are involved, which realized by software and hardware technology. Moreover, a point-to-point communication system is set up.Having known well on the study of the current situation about quantum cryptographic key, the RR quantum cryptographic key distribution protocol is concerned in this paper. The protocol includes the preparation of the Secret-key,the eavesdropper detection,secret-key correction and Privacy amplification. A design scheme of cryptogram transmission system based on FPGA is presented, which is used to implement the simulation of the quantum transmission channels. Furthermore, a circuit of FPGA power-on configuration is realized.To simulate the preparation of the secret-key, a Gaussian random number generator in FPGA is designed, which based on the analysis of Ziggurat algorithm. The generator includes Tausworthe Uniform random number generator module and 16×16bit multiplication module which has a structure of 4:2 compressor and improved-CLA. The period length of generated Gaussian random secret-key is longer than 288, and its precision is high (achieve 26 fractional bits). Furthermore, the generated Gaussian random number has pass the normal test.According to public discussion in Internet, the two parties of communication implement the secret-key correction. Boundaries-Divided algorithm and Maximum Likelihood Slices Estimator algorithm are programmed with Matlab language. Each step of Cascade and Privacy amplification is also analyzed. By debugging between two PC in Internet, the simulation of the protocol is completed and the process of encryption and...
Keywords/Search Tags:Quantum Cryptography, Reverse Reconciliation, FPGA, Gaussian random number
PDF Full Text Request
Related items