Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model
Autor: | Ryan D. Engle, Douglas D. Hodson, Colin V. McLaughlin, Michael R. Grimaila, Logan O. Mailloux, Gerald Baumgartner |
---|---|
Rok vydání: | 2017 |
Předmět: |
Decoy state
Exploit business.industry Computer science System level model 020206 networking & telecommunications Cryptography Keying 02 engineering and technology Quantum key distribution 01 natural sciences 010309 optics Modeling and Simulation 0103 physical sciences 0202 electrical engineering electronic engineering information engineering business Engineering (miscellaneous) Protocol (object-oriented programming) Computer network |
Zdroj: | The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 16:27-44 |
ISSN: | 1557-380X 1548-5129 |
DOI: | 10.1177/1548512917698053 |
Popis: | Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems. |
Databáze: | OpenAIRE |
Externí odkaz: |