Abstract
Quantum key distribution is an innovative technique to distribute encryption keys without compromise. This paper focuses on the application of this technique to achieve reliable communication in an ever-evolving and increasingly vulnerable environment. Designers of cryptosystems have three basic objectives; designing cryptographic algorithms that adequately scramble the target data, developing strong encryption keys to lock and unlock the algorithm, and securely distributing the keys between communicating devices. The advance of quantum computing technologies threatens to expose the world's most prolific key method overnight. Though quantum computing is not yet a reality, the basic principles have been proven in laboratories. Furthermore, quantum computing has been shown to be especially suited for computations of complex mathematic equations; such as distilling the private keys from the public keys used in public key infrastructures (PKI). In this environment, it's comforting to know that the most advanced technology in the broad field of quantum communications just happens to be a new method of creating and distributing encryption keys. This technology is referred to as quantum key distribution (QKD). QKD technologies shift the current paradigm on two plains. The first is that it uses quantum principles, rather than conventional means, for distributing keys between devices. The quantum principles guarantee the key can not be intercepted during transmission without alerting the users of a compromise. The second shift is derived from the fact that encrypted data can not be intercepted today and decrypted at a later date when the computing power exists to crack the code. This shift is dependant on the use of a combination of QKD and one-time pad. Because of the quantum principles that QKD relies on, when a key is successfully created and shared, it can not be cracked using intercepted data. The keys are derived from a convergence of random operations conducted at the sender and receiver stations. Indeed, neither the sender nor the receiver can determine what the key will be until the entire process is completed. As a piece of our security infrastructure, QKD significantly raises our security posture. This paper explains the application of quantum principals used to enable QKD systems.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have