QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS

{"title":"QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS","authors":"","doi":"10.18469/ikt.2023.21.1.09","DOIUrl":null,"url":null,"abstract":"Secure data exchange over the network is ensured by the requirements of confidentiality, integrity and availability of information. To meet these requirements, sent data is encrypted on the sending side, and the received information is decrypted on the receiving side. Transmitted message is encrypted according to rules determined by the algorithm and key. Crypto security of encrypted information depends on the key length. Among the encryption algorithms, there are algorithms with a symmetric (private) key and with an asymmetric (public) key. Despite all the advantages of a private key, asymmetric keys are used to deliver it from one user to another (key distribution). However, high-performance quantum computers are capable to decrypt intercepted data. Therefore, modern cryptographic systems use quantum key distribution method. The idea of using quantum bits was proposed in 1970 by S. Wiesner. In 1984, Ch. Bennett and G. Brassard proposed the BB84 protocol. The use of «entangled » quanta for systems with quantum key distribution was offerred in 1991 by A. Eckert. All modern quantum cryptography systems are based on these above-mentioned protocols.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"133 ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Infokommunikacionnye tehnologii","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18469/ikt.2023.21.1.09","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Secure data exchange over the network is ensured by the requirements of confidentiality, integrity and availability of information. To meet these requirements, sent data is encrypted on the sending side, and the received information is decrypted on the receiving side. Transmitted message is encrypted according to rules determined by the algorithm and key. Crypto security of encrypted information depends on the key length. Among the encryption algorithms, there are algorithms with a symmetric (private) key and with an asymmetric (public) key. Despite all the advantages of a private key, asymmetric keys are used to deliver it from one user to another (key distribution). However, high-performance quantum computers are capable to decrypt intercepted data. Therefore, modern cryptographic systems use quantum key distribution method. The idea of using quantum bits was proposed in 1970 by S. Wiesner. In 1984, Ch. Bennett and G. Brassard proposed the BB84 protocol. The use of «entangled » quanta for systems with quantum key distribution was offerred in 1991 by A. Eckert. All modern quantum cryptography systems are based on these above-mentioned protocols.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
量子密码学方法和工具
网络上的安全数据交换由信息的保密性、完整性和可用性要求来保证。为满足这些要求,发送方对发送的数据进行加密,接收方对接收的信息进行解密。发送的信息根据算法和密钥确定的规则进行加密。加密信息的加密安全性取决于密钥长度。在加密算法中,有使用对称(私人)密钥的算法,也有使用非对称(公共)密钥的算法。尽管私钥有很多优点,但非对称密钥用于将其从一个用户传递给另一个用户(密钥分发)。然而,高性能量子计算机能够解密截获的数据。因此,现代密码系统使用了量子密钥分发方法。使用量子比特的想法由 S. Wiesner 于 1970 年提出。1984 年,Ch. Bennett 和 G. Brassard 提出了 BB84 协议。1991 年,A. Eckert 提出在量子密钥分配系统中使用 "纠缠 "量子。所有现代量子密码系统都基于上述协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DISTRIBUTED ARTIFICIAL INTELLIGENCE MODELS IN PERSPECTIVE COMMUNICATION NETWORKS SOFTWARE GENERATORS IN THE GPSS WORLD ENVIRONMENT FOR DISTRIBUTIONS-PROBABILITY MIXTURES WITH QUALITYASSESSMENT RESULTS ANTENNAS FOR INSTALLATION ON UNMANNED AERIAL VEHICLES DETERMINATION OF THE THRESHOLD SOLUTION FOR A CHANNEL WITH RAY-LEIG FADING WHEN PROBING THE COGNITIVE RADIO ENERGY DETECTOR SPECTRUM QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1