Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2003
DOI: 10.1145/863955.863982
|View full text |Cite
|
Sign up to set email alerts
|

Quantum cryptography in practice

Abstract: BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
60
0
1

Year Published

2005
2005
2014
2014

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 128 publications
(61 citation statements)
references
References 23 publications
0
60
0
1
Order By: Relevance
“…It proposes the idea of using QKD in IPSEC as Key generator for AES. In 2003, BBN technologies describes the possibility of integrating QKD within the standard IKE [8] and announces some concerns linked to the compatibility of QKD with IKE. In our paper, we propose a QKD solution for IPSEC called SEQKEIP that is not based on IKE but on ISAKMP.…”
Section: B Seqkeip Operating Modementioning
confidence: 99%
“…It proposes the idea of using QKD in IPSEC as Key generator for AES. In 2003, BBN technologies describes the possibility of integrating QKD within the standard IKE [8] and announces some concerns linked to the compatibility of QKD with IKE. In our paper, we propose a QKD solution for IPSEC called SEQKEIP that is not based on IKE but on ISAKMP.…”
Section: B Seqkeip Operating Modementioning
confidence: 99%
“…In 2002, the Defense Advanced Research Projects Agency (DARPA) built a QKD system to explore networks that had multiple Alice and Bob system pairs rather than a single system [22]. The system integrated QKD-based key generation, traditional Ethernet encryption, and key management to secure a virtual private network (VPN) that was compatible with existing telecommunication infrastructure.…”
Section: Darpa Network: Introducing Layersmentioning
confidence: 99%
“…• An entity cannot measure or copy the state of a quantum without altering it. The BB84 protocol has been the first proposed protocol that is based on them, as well as some other major quantum cryptography protocols [2][3][5][6][7][8][9][10][11], have been widely adopted in applications and experiments [12][13][14].…”
Section: Introductionmentioning
confidence: 99%