2020
DOI: 10.1002/spy2.111
|View full text |Cite
|
Sign up to set email alerts
|

On the security and confidentiality of quantum key distribution

Abstract: Cryptography is a scientific method that is used to transmit secret information. In contrast, quantum cryptography depends on physical laws to encrypt information; when the quantum computer appeared, the classic encryption method becomes inefficient. The quantum method is commonly used to distribute keys, a process called as quantum key distribution (QKD). In this paper, we consider the efficiency of the quantum method compared to classical methods. Also, we discuss the security of QKD against several attacks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 44 publications
(56 reference statements)
0
4
0
Order By: Relevance
“…This integration allows for the utilization of the complete set of advanced encryption algorithms. The standard still maintains the Level III and Level V levels in the secure quantum computer attack environment, and there is no need to change the original encryption architecture of Rijndael, as [10] did, which successfully achieves the purpose of this research project.…”
Section: Discussionmentioning
confidence: 81%
See 1 more Smart Citation
“…This integration allows for the utilization of the complete set of advanced encryption algorithms. The standard still maintains the Level III and Level V levels in the secure quantum computer attack environment, and there is no need to change the original encryption architecture of Rijndael, as [10] did, which successfully achieves the purpose of this research project.…”
Section: Discussionmentioning
confidence: 81%
“…However, the computing power of current quantum computers is not sufficiently strong [9,10], therefore there are still has many problems to overcome.…”
Section: Quantum Computermentioning
confidence: 99%
“…In Scheme 2, a single imposition of a quantum sequence leads to the imposition of the next channel authentication key, which in turn can lead to the permanent imposition of a quantum sequence and as a consequence, QK. The adversary can switch to classical MitM [13,19] after a successful attack on Scheme 2 since he knows the authentication key of all subsequent iterations until he skips one QKD iteration. System security will be restored if an adversary skips at least one QKD session, on the assumption that the channel authentication keys of this session will match on the nodes.…”
Section: Single Imposition Of a Quantum Sequencementioning
confidence: 99%
“…Moreover, researchers have found huge interest in QKD due to the growing demand for highly secure services, including financial transactions, data trading, military operations, and other government services. QKD generates and distributes secret keys using different QKD protocols [3][4][5][6][7][8][9] between the sender and the receiver [10][11][12]. The generated quantum secret keys can then be used to encrypt and decrypt the original information [13].…”
Section: Introductionmentioning
confidence: 99%