• Title/Summary/Keyword: QKD

Search Result 20, Processing Time 0.027 seconds

Privacy Amplification of Quantum Key Distribution Systems Using Continuous Variable (연속 변수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.1-5
    • /
    • 2016
  • The continuous variable quantum key distribution has been considered to have practical solution to provide high key rate. This paper explains the difference between DV-QKD and CV-QKD schemes. It describes CV-QKD as a theory that satisfies the uncertainty principle using continuous variable and homodyne detector. We shows varying length of secret key in QKD systems and amount of the exposed information to amplify privacy.

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

양자 상태 수 변화에 따른 양자 암호키 분배 보안성 분석

  • Go, Hae-Sin;Im, Gyeong-Cheon;Kim, Gi-Ung;Seo, Chang-Ho;Lee, Jun-Gu
    • Information and Communications Magazine
    • /
    • v.31 no.9
    • /
    • pp.70-76
    • /
    • 2014
  • 절대 보안성을 제공하는 양자 키 분배 (quantum key distribution, QKD)는 양자 역학을 이용한 정보통신 응용 중 가장 현실적으로 유망한 분야이다. BB84는 가장 널리 알려진 양자 암호키 분배 프로토콜로써, 4개의 양자 상태를 사용한다. 그 이후, 6개의 양자 상태를 사용하는 six-state 프로토콜이 제안되었으며, 이는 기 제안된 BB84프로토콜 대비 더 높은 보안성을 보이는 것으로 알려져 있다. 또한 QKD의 암호키 전송률 및 보안성 증가를 위해 이중 큐빗 QKD 프로토콜이 제안되었다. 이중 큐빗은 하나의 광자에 편광, 위상, 그리고 주파수 등의 서로 다른 두 개의 변조를 하는 것이다. 이중 큐빗 QKD 프로토콜은 16개의 양자 상태를 사용하며, 심볼 오류율 (Symbol Error Rate, SER)관점에서 앞서 언급한 두 개의 프로토콜 보다 더 높은 보안성을 보장할 수 있다. 본고에서는 앞서 언급한 총 3종류의 QKD 프로토콜의 보안성을 분석하고 비교함으로써 양자 상태 증가에 따른 QKD보안성을 성능을 살펴본다.

Recent Technology Trends of Free-Space Quantum Key Distribution System and Components (무선 양자암호통신 시스템 및 부품 최신 기술 동향)

  • Youn, C.J.;Ko, H.;Kim, K.J.;Choi, B.S.;Choe, J.S.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.94-106
    • /
    • 2018
  • A quantum key distribution (QKD) provides in principle an unconditional secure communication unlike the standard public key cryptography depending on the computational complexity. In particular, free-space QKD can give a secure solution even without a fiber-based infrastructure. In this paper, we investigate an overview of recent research trends in the free-space QKD system, including satellite and handheld moving platforms. In addition, we show the key components for a free-space QKD system such as the integrated components, single photon detectors, and quantum random number generator. We discuss the technical challenges and progress toward a future free- space QKD system and components.

A Design of Secure Communication Architecture Applying Quantum Cryptography

  • Shim, Kyu-Seok;Kim, Yong-Hwan;Lee, Wonhyuk
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.123-134
    • /
    • 2022
  • Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.

Efficient Post-Processing for Quantum Communication Systems (양자 통신 시스템의 효율적 후처리 방식)

  • Lee, Sun Yui;Jung, Kuk Hyun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • Quantum cryptography is one of the most feasible fields using quantum mechanics. Therefore, quantum cryptography has consistently been researched, and a variety of cryptographic exchange method has been developed, such as BB84, etc. This paper explains a basic concept of quantum communications and quantum key distribution systems using quantum mechanics. Also, it introduces a reason of the development of quantum cryptography and attack scenarios which threaten the security of QKD. Finally, the experiment of this paper simulates quantum key attack by estimating qubit phases through a modeled quantum channel, and discusses needs of post-processing methods for overcoming eavesdropping.

Security Amplification of Partially Trusted Quantum Key Distribution System (부분 신뢰성을 갖는 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.152-156
    • /
    • 2017
  • This paper introduces the concept of random security amplification to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition;we show that random security amplification in terms of security amplification offers better security than using existing universal hash function. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD. Finally, the proposed random security amplification and the conventional scheme compare the security according to the key generation rate in the quantum QKD.

양자 키 분배 기술을 활용한 하이브리드 키 교환 방법

  • SIM, Dong-Hi
    • Review of KIISC
    • /
    • v.32 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • 본 논문에서는 표준화 기구에서 개발되었거나 아직 개발 중인, 양자 컴퓨팅에 의한 공격에 대해 안전한 양자 내성 보안체계로의 전환을 위해 양자 키 분배 (Quantum Key Distribution - QKD) 기술을 암호키 교환에 활용하는 다양한 하이브리드 접근 방식 들을 살펴보았다. 이러한 방법들은 두 가지 이상의 서로 다른 키 교환 방법을 결합하는 '키 교환을 위한 하이브리드 접근 방식'들을 의미한다. 양자 키 분배(QKD) 네트워크에서 생성하는 대칭 키를 활용하여 다른 방식으로 생성된 암호키와의 다양한 방식의 결합을 통한 하이브리드 접근 방식의 호환성에 대해서 살펴보았고, 아울러 다양한 네트워크 계층의 보안 통신 프로토콜과 함께 QKD를 함께 사용할 수 있도록 하는 표준들을 함께 분석하였으며, 이러한 표준들에서 추가적으로 개발이 필요한 영역들을 함께 살펴보았다.

Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem (양자키분배와 RSA 암호를 활용한 이중키 설정 키유도함수)

  • Park, Hojoong;Bae, Minyoung;Kang, Ju-Sung;Yeom, Yongjin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.479-488
    • /
    • 2016
  • For a secure communication system, it is necessary to use secure cryptographic algorithms and keys. Modern cryptographic system generates high entropy encryption key through standard key derivation functions. Using recent progress in quantum key distribution(QKD) based on quantum physics, it is expected that we can enhance the security of modern cryptosystem. In this respect, the study on the dual key agreement is required, which combines quantum and modern cryptography. In this paper, we propose two key derivation functions using dual key agreement based on QKD and RSA cryptographic system. Furthermore, we demonstrate several simulations that estimate entropy of derived key so as to support the design rationale of our key derivation functions.

Privacy Amplification of Quantum Key Distribution Systems Using Dual Universal Hush Function (듀얼 유니버셜 해쉬 함수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.38-42
    • /
    • 2017
  • This paper introduces the concept of a dual hash function to amplify security in a quantum key distribution system. We show the use of the relationship between quantum error correction and security to provide security amplification. Also, in terms of security amplification, the approach shows that phase error correction offers better security. We describe the process of enhancing security using the universal hash function using the BB84 protocol, which is a typical example of QKD. Finally, the deterministic universal hash function induces the security to be evaluated in the quantum Pauli channel without depending on the length of the message.