Abstract

Quantum key distribution (QKD) is the objects of close attention and rapid progress due to the fact that once first quantum computers are available – classical cryptography systems will become partially or completely insecure. The potential threat to today’s information security cannot be neglected, and efficient quantum computing algorithms already exist. Quantum cryptography brings a completely new level of security and is based on quantum physics principles, comparing with the classical systems that rely on hard mathematical problems. The aim of the article is to overview QKD and the most conspicuous and prominent QKD protocols, their workflow and security basement. The article covers 17 QKD protocols and each introduces novel ideas for further QKD system improvement.

Highlights

  • Current cryptography security relies on hard mathematical problems impossible to break nowadays on classical computer (CC) within a polynomial time

  • BB84 is the first Quantum key distribution (QKD) protocol that has become the basis of many further QKDs and nowadays a variety of protocols are based on it

  • In DV-QKD protocols, it is required that Bob randomly switches measurement basis

Read more

Summary

INTRODUCTION

Current cryptography security relies on hard mathematical problems impossible to break nowadays on classical computer (CC) within a polynomial time. Public-key cryptography relies on the mathematical assumption that prime factorization is impossible to be solved by CC, due to computational power limitation and/or lack of efficient algorithm for solving a factorization problem. There is an efficient factorization algorithm on a QC [1]. This suggests that as soon as the first large-scale quantum computer switches on, most of today’s crypto-graphic systems could collapse overnight [2]. The most prominent quantum key distribution protocols are explained, and comparative summary is prepared. The present paper covers the proved QC algorithms that will expose CC cryptography (Section 2).

QUANTUM COMPUTING IMPACT ON CRYPTOGRAPHY
Shor’s Algorithm and Impact on Asymmetric Cryptography
Grove’s Algorithm against Symmetric Cryptography
QUANTUM PHYSICS PRINCIPLES IN THE BASEMENT OF CRYPTOGRAPHY
QUANTUM BIT – QUBIT
QUANTUM KEY DISTRIBUTION PROTOCOLS AND CLASSIFICATIONS
Discrete Variable and Continuous Variable QKDs
Discrete Variable QKD Protocols
Continuous Variable Protocols
Device Independence
Public Key Cryptography QKD
COMPARISON TABLE OF QKD PROTOCOLS
COMPARISON RESULTS OF DESCRIBED OKD PROTOCOLS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call