Statistical analysis for random bits generation on quantum key distribution

O. Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, A. M. Salem
{"title":"Statistical analysis for random bits generation on quantum key distribution","authors":"O. Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, A. M. Salem","doi":"10.1109/CyberSec.2014.6913970","DOIUrl":null,"url":null,"abstract":"Recently, Quantum cryptography researchers utilize the quantum keys, in order to provide a more trusted environment for both key distribution and management processes. The quantum keys are generated based on quantum mechanics phenomena. However, all events for the quantum key generation rely on exchanging photons between parties over limited distances. So, in this paper, random tests algorithms, such as NIST and DIEHARD, are implemented to test and evaluate the randomness rates for quantum keys generation. After then, the initialized vector, which is the seed of the symmetric encryption algorithms, is established based on specific analysis to be a key for the algorithms. The paper utilizes the (BB84) quantum key distribution (QKD) protocol based on two different innovated modes, the raw and privacy modes.","PeriodicalId":383642,"journal":{"name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSec.2014.6913970","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Recently, Quantum cryptography researchers utilize the quantum keys, in order to provide a more trusted environment for both key distribution and management processes. The quantum keys are generated based on quantum mechanics phenomena. However, all events for the quantum key generation rely on exchanging photons between parties over limited distances. So, in this paper, random tests algorithms, such as NIST and DIEHARD, are implemented to test and evaluate the randomness rates for quantum keys generation. After then, the initialized vector, which is the seed of the symmetric encryption algorithms, is established based on specific analysis to be a key for the algorithms. The paper utilizes the (BB84) quantum key distribution (QKD) protocol based on two different innovated modes, the raw and privacy modes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
量子密钥分配中随机比特生成的统计分析
最近,量子密码学研究人员利用量子密钥,为密钥分发和管理过程提供更可信的环境。量子密钥是根据量子力学现象生成的。然而,量子密钥生成的所有事件都依赖于在有限距离内各方之间交换光子。因此,本文采用NIST和DIEHARD等随机测试算法来测试和评估量子密钥生成的随机率。然后,根据具体分析,建立初始化向量,即对称加密算法的种子,作为算法的密钥。本文采用了基于原始模式和隐私模式两种不同创新模式的(BB84)量子密钥分发(QKD)协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An approach for forensic investigation in Firefox OS Mobile forensic data acquisition in Firefox OS Challenges pertaining to cyber war under international law The importance of mandatory data breach notification to identity crime Modifying authentication techniques in mobile communication systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1