![]() Then, a photon sequence as an encryption of the bit sequence is generated and sent through a quantum channel. Therefore, each bit value can be either orthogonally or diagonally represented Fig. 8.4 shows how diagonal and orthogonal polarizers give a random quantum state to each bit value. In the same way, one (1) can be encoded by the vertical or +45 o diagonal state. As mentioned in Table 8.1, zero (0) can be encrypted as the horizontal or −45 o diagonal state. The photon polarization states encode bit values thus, polarized photons are able to carry digital information. Table 8.1 shows all four polarization states and their associated bit values. The different (linear) polarization of a photon can be provided by a horizontal, vertical, and −45 o and +45 o diagonal. The sender polarizes photons based on four different types of polarization and bit values. For transferring information through a quantum channel (e.g., fiber optic), the bit value, 0 or 1, is attached to each photon by polarization. Key Exchange: In this step, one of the authorized parties (sender) generates/sends random secure quantum bits. As its name suggests, QKD refers to secure key management at the quantum level. ![]() In quantum cryptography, two authorized parties are capable of generating a random secret key (security is guaranteed by the laws of physics) at the quantum level for data encryption and decryption. ![]() QKD offers a new secure method for the distribution of cryptographic keys. In addition, using a one-time pad is not practical at all, due to its key management issues. Because the security of the symmetric and asymmetric key cryptography comes from the difficulty of the computational problems they use, their success in data encryption can always be compromised by future advances in decryption methods. Secret key cryptography, or even public key cryptography, cannot guarantee the security of transmitted information through communication channels. Wencong Su, in The Energy Internet, 2019 8.5 Quantum key distributionĪs previously emphasized, secure sharing of keys between authorized parties is one of the fundamental challenges of cryptography. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |