Font Size: a A A

Reseach On Application Architecture Design And Methods Base On Quantum Key Distribution System

Posted on:2015-10-09Degree:MasterType:Thesis
Country:ChinaCandidate:B WangFull Text:PDF
GTID:2180330473451908Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Quantum Key Distribution(QKD) technology, which has the characteristic of physics security, it has aroused general concern. Due to unconditional security of Quantum Key negotiation, it plays a significant role in military, government, finance and other areas. Recently the theory and experiment on Quantum Communication and QKD have made a prominent progress. But it is hard to popularize the implementation, considering the bottleneck of performance such as irrational modules, complexity of electromagnetism environment, security of application environment, speed and so on.In this paper we make contributions to solve some of the problems mentioned above. The research object of this paper is to embed Network of QKD in traditional network. Based on QKD technology and O ne Time Pad(OTP) architecture, we give a proposal on how to apply QKD technology in traditional network and make some argumentation on its security threats and solutions. We also make some research on how to apply Quantum Key. Finally design the program on key equipment of Quantum Key.The content of this paper mainly contains the following parts.1.Researching on how to apply QKD in traditional network and give three solutions direct-application scheme, protection with secret key and expansion of secret key.2.Researching on security threat and solutions of the mixed network. Propose a security model for the mixed network and analyze the security threat when using Quantum terminal and equipment of QKD. These accomplishments can make significant support and instruction for QKD applying in traditional network.3. Researching on how to apply Quantum Key. Propose a mechanism which suggests take 16 detections before expansion of secret key and 5 tests detections after expansion of secret key according to the standard of NIST. And validate the randomicity of the QKD-equipment. The result of the experiment shows that the randomicity of the QKD-equipment sample achieves the demand of the standard.4.Design and implement a sample of QKD-equipment which applies Q uantum Key to areas of security voice communication and security data transmission. And make some validation in QKD test-bed network. The result shows that the function of secret key expansion and speed satisfy the demand of application. It makes significant support for QKD applying.
Keywords/Search Tags:Quantum Key Distribution, security threat, secret key test, traditional network
PDF Full Text Request
Related items