Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution
DOI:
https://doi.org/10.2478/ecce-2022-0006Keywords:
BB84 protocol, Quantum key distribution, Quantum cryptography, SimulationAbstract
The Quantum Key Distribution (QKD) is a well-researched secure communication method for exchanging cryptographic keys only known by the shared participants. The vulnerable problem of a secret key distribution is the negotiation and the transfer over an insecure or untrusted channel. Novel further developments of the QKD communication method are part of in-field technologies and applications in communication devices, such as satellites. However, expensive physical test setups are necessary to improve new application possibilities of cryptographic protocol involving components of quantum mechanics and quantum laws of physics. Therefore, optical simulation software can play a part in essential QKD simulating and further developing quantum-based cryptosystems. In the paper, the authors consider a feasible QKD setup based on the BB84 protocol to create a symmetric key material based on achieving a linear key rate via optical simulation software. The paper still provides two experimental architecture designs to use the QKD for a cryptosystem.References
P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, Nov. 1994, pp. 124–134. https://doi.org/10.1109/SFCS.1994.365700
P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997. https://doi.org/10.1137/S0097539795293172
J. L. Park, “The concept of transition in quantum mechanics,” Found Phys, vol. 1, pp. 23–33, Mar. 1970. https://doi.org/10.1007/BF00708652
C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179.
C. H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical review letters, vol. 68, pp. 3121–3124, 1992, https://10.1103/physrevlett.68.3121
A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical review letters, vol. 67, pp. 661–663, 1991. https://10.1103/PhysRevLett.67.661
S. Mishra et al., “BBM92 quantum key distribution over a free space dusty channel of 200 meters”, Journal of Optics, vol. 24, no. 7, pp. 074002, 2022. https://doi.org/10.48550/arXiv.2112.11961
A. Buhari, Z. A. Zukarnain, S. K. Subramaniam, H. Zainuddin, and S. Saharudin, “An efficient modeling and simulation of quantum key distribution protocols using OptiSystem,” in 2012 IEEE Symposium on Industrial Electronics and Applications, Bandung, Indonesia, Sep. 2012, pp. 84–89. https://doi.org/10.1109/ISIEA.2012.6496677
B. Archana and S. Krithika, “Implementation of BB84 quantum key distribution using OptSim,” in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Feb. 2015, pp. 457–460. https://doi.org/10.1109/ECS.2015.7124946
O. Grote, A. Ahrens, and C. Benavente-Peces, “Modelling and simulation of quantum key distribution using OptSim,” in 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, Oct. 2021, pp. 160–164. https://doi.org/10.1109/MTTW53539.2021.9607165
Synopsys. OptSim, Software for Design and Simulation of Optical communication. [Online]. Available: https://www.synopsys.com/photonic-solutions/optsim/single-modenetwork.html. [Accessed on: Dec. 13, 2021].
S. Pirandola et al., “Advances in quantum cryptography”, Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020. https://doi.org/10.1364/AOP.361502
S. Flammia and J. Wallman, “Efficient estimation of Pauli channels”, ACM Transactions on Quantum Computing, vol.1, no. 1, Art. no. 3, Dec. 2020. https://doi.org/10.1145/3408039
X. Wang, “Perfect random number generator is unnecessary for secure quantum key distribution”, 2004, arXiv:quant-ph/0405182v2.
A. Boaron et al., “Secure quantum key distribution over 421 km of optical fiber”, Physical Review Letters, vol. 121, Art. no. 190502, Nov. 2018. https://doi.org/10.1103/PhysRevLett.121.190502
P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997. https://doi.org/10.1137/S0097539795293172
J. L. Park, “The concept of transition in quantum mechanics,” Found Phys, vol. 1, pp. 23–33, Mar. 1970. https://doi.org/10.1007/BF00708652
C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179.
C. H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical review letters, vol. 68, pp. 3121–3124, 1992, https://10.1103/physrevlett.68.3121
A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical review letters, vol. 67, pp. 661–663, 1991. https://10.1103/PhysRevLett.67.661
S. Mishra et al., “BBM92 quantum key distribution over a free space dusty channel of 200 meters”, Journal of Optics, vol. 24, no. 7, pp. 074002, 2022. https://doi.org/10.48550/arXiv.2112.11961
A. Buhari, Z. A. Zukarnain, S. K. Subramaniam, H. Zainuddin, and S. Saharudin, “An efficient modeling and simulation of quantum key distribution protocols using OptiSystem,” in 2012 IEEE Symposium on Industrial Electronics and Applications, Bandung, Indonesia, Sep. 2012, pp. 84–89. https://doi.org/10.1109/ISIEA.2012.6496677
B. Archana and S. Krithika, “Implementation of BB84 quantum key distribution using OptSim,” in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Feb. 2015, pp. 457–460. https://doi.org/10.1109/ECS.2015.7124946
O. Grote, A. Ahrens, and C. Benavente-Peces, “Modelling and simulation of quantum key distribution using OptSim,” in 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, Oct. 2021, pp. 160–164. https://doi.org/10.1109/MTTW53539.2021.9607165
Synopsys. OptSim, Software for Design and Simulation of Optical communication. [Online]. Available: https://www.synopsys.com/photonic-solutions/optsim/single-modenetwork.html. [Accessed on: Dec. 13, 2021].
S. Pirandola et al., “Advances in quantum cryptography”, Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020. https://doi.org/10.1364/AOP.361502
S. Flammia and J. Wallman, “Efficient estimation of Pauli channels”, ACM Transactions on Quantum Computing, vol.1, no. 1, Art. no. 3, Dec. 2020. https://doi.org/10.1145/3408039
X. Wang, “Perfect random number generator is unnecessary for secure quantum key distribution”, 2004, arXiv:quant-ph/0405182v2.
A. Boaron et al., “Secure quantum key distribution over 421 km of optical fiber”, Physical Review Letters, vol. 121, Art. no. 190502, Nov. 2018. https://doi.org/10.1103/PhysRevLett.121.190502
Downloads
Published
2022-06-01
Issue
Section
Articles
License
Copyright (c) 2022 Olaf Grote et al., published by Sciendo
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Grote, O., & Ahrens, A. (2022). Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution. Electrical, Control and Communication Engineering, 18(1), 43-49. https://doi.org/10.2478/ecce-2022-0006