Font Size: a A A

Based On Visual Algorithms Quantum Cryptography BB84 Protocol Application Research

Posted on:2019-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:H F SongFull Text:PDF
GTID:2370330572952834Subject:Engineering
Abstract/Summary:PDF Full Text Request
No deciphering is the ultimate goal in information security.Whether in business competitions or in military interventions,it is essential to obtain or maintain strategic and tactical superiority with information security.Quantum cryptography is of the proved unconditional security.But,because of all kinds of limits,it was not applied to practice.In order to improve the practicability of quantum cryptography protocol,it was made simple and high-security.In this paper,quantum cryptography BB84 protocol and visual cryptography technology were researched.It was attempted combining the quantum algorithms and visual algorithms to improve the whole system performance.Visual cryptography technology is a security algorithm which is of special significance.It combined photo encode to security algorithm,secure in theory but not anti-eavesdropping in fact.The pixels in the key photo allocate randomly.When decoding,it is enough overlaying the key photos.Encoding is simple,decoding is easy.It is high-security and handy.For the users,cryptography knowledge is not essential any more.It can transport high-security information in low-technology conditions.However,during the procedure of distributing key,because the eavesdroppers were not detected by the users,it brought serious hidden trouble to the information security in the system.At the same time,considering visual encoding is also an error-correction algorithm,if the eavesdropper cloned a part of the key information,the procedure of key distribution could be no sense.Quantum cryptography BB84 protocol is the first quantum security protocol.The security is assured by physics principle of quantum mechanics.But it is not applied easily.It is essential preparing a fairly long random sequence.Only if the sample is large enough,it reflects the statistical characteristics of quanta.In addition,after the quanta are received,it is essential to apply error estimation,error correction and security amplification,a train of security procedures.So the key-generating ratio is very low,and the algorithm procedure is very complex and inefficient.Even if it generated an adequately long key,it would not be easy to preserve and apply.In this paper,based on the coding characteristics of Quantum cryptography BB84protocol and visual cryptography protocol,it is the availability,the proved unconditional security and the practicability of the simulation system that were researched.It is the identity authentication model and the security communication model,based on visual algorithm quantum cryptography BB84 protocol,that were established.The security amplification was legitimately removed,so the system was simplified.In the identity authentication model,based on visual algorithm quantum cryptography BB84 protocol,the computing is irreversible degradation from group to semi-group.It is essential combining image-processing algorithm to reduce the influence on communication quality of the unfiltered noise introduced by visual algorithm[45].But the noise can not be removed completely.Through artificial intelligent image processing,it is fuzzy computing transformed from semi-group to group.Thus the validity of security key photo was confirmed,the information of the key was read along with the greatly reduced influence of the noise,which was not completely removed,introduced by visual algorithm.But it did not solve the problem on the accuracy of information expression in the decoding photo,so it did not acquire all the information in the key.At this time,the secret key-generation ratio is 100%.Because of the influence of the focused regional eavesdropping,the ciphertext is not of the proved unconditional security any more.The system can solve general identity authentication problem.Quantum secret communication model is of the proved unconditional security,and it completely removed the influence of the visual algorithm on system communication quality.Theoretically the decoding photo,the same as the secret photo,is obtained.At this time,the secret key-generation ratio ???.At last,through the group theory,the system availability was proved.And it is with the classical error-correcting code that efficiently encoded and decoded arbitrary bit stream.The high key-generation ratio of coding and the high accuracy of decoding can not be both obtained at the same time in some degree.But whatever the key-generation ratios of the new algorithm models are both much higher than the original quantum cryptography BB84protocol.The simulation result shows that it is based on visual algorithm quantum cryptography BB84 protocol that assured the reliability in the system with the proved unconditional security,and the secret key generation ratio is much higher than that of the quantum cryptography BB84 protocol with traditional error-correcting code.The new algorithm legitimately simplified the coding procedure of original quantum cryptography BB84 protocol,and enhanced the operational efficiency of the simulation system.It is the proved unconditional security of quantum cryptography that needs to be assured by hardware.It is the controlled single photon generators and the secure random sequence generators that are the unsolved problems.In the near future,maybe it is an available and on-line quantum security communication system that is set up,that is of simple structure,easy coding,quick decoding and the proved unconditional security.
Keywords/Search Tags:Quantum cryptography, Visual cryptography, Error-correcting code
PDF Full Text Request
Related items