Font Size: a A A

Research Of Certain Number Of Quantum Security Mechanism Key Technologies

Posted on:2013-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:M D LiFull Text:PDF
GTID:2248330371981832Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Secure communication is a means of communication for the purpose of hiding the realinformation content in the process of data communication by encryption or some other means. Itfirst originated in the field of the political sphere and the military field , as the development ofthe secure communication, it is now playing an important role in a lot of fields. The exitingclassical secure communication systems tend to basing on classical cryptography, which mostlyin view of computational complexity in the sense of difficult issues without rigorous certification.With the advances in cryptography and information security technology, a lot of those classicalcryptographic algorithms used to be proved secure is not secure anymore.In this paper, we begin with discussing the basic principles of quantum cryptography, thenwe introduce the theory and process of some of the classic quantum key distribution protocols.Quantum cryptography is a new cryptosystem based on the classical cryptography and quantummechanics, it uses the basic properties and principles of microscopic particles to transfer keyinformation and stretch classical cryptography. It provides not only unconditional security if onlythe eavesdropper has known the ciphertext but also the ability to detect eavesdrops. At present,the security of single-qubit quantum key distribution protocol has been considered thoroughlyand perfectly both in the theory and experimental study, and some of them has been usedperfectly in real life. Nowadays, researchers have focusd on the improvement of the existingquantum key distribution, for example: how to improve quantum bit utilization, the rate of keyand tolerable error rate and so on.However, quantum cryptography is only secure in the theory of quantum mechanics, Underrealistic device conditions, there are still some eavesdroppers.Generally speaking, we call aneavesdropper“Eve”. On the basis of the results of previous studies, In this paper, we first focusour research on Eve’s commonly used method of attack and analysis of the reason, principle andprogress of each manner of the attacks above; emphatically,we give the conclusion that whetherthose attacks can pose a threat to the protocols combined current quantum key distributionagreements. That is, loopholes of the agreements in front of these attacks.Then we research on and then perfect a quantum key distribution protocol to find a moresecure quantum key distribution protocol on the basis of entangled state–W state. Duringeavesdropping detection, CA、Alice and Bob will randomly choose some of the quantums todetect whether there is an eavesdropper. We use Bell-CH inequality in the stage of eavesdropping detection and it turns out to be a better scheme than some of the existing schemes, forexample:Hardy’s proof. Contrasting to pre-existing schemes, we given the concrete scheme ofeavesdropping detection which showing some better results such as sensibility, provability andother features based on Bell-CH inequality.
Keywords/Search Tags:quantum cryptography, quantum communication, quantum key distribution, cryptanalysis
PDF Full Text Request
Related items