You are here: Home Contents V7 N1 V7N1_Pant.html
Personal tools

Tutorial - Certainly Verifiable Cryptography Using the Verifiable Uncertainty of Quantum Physics: A Primer on Quantum Key Distribution (QKD)



Full text

Journal of Information System Security
Volume 7, Number 1 (2011)
Pages 4879
ISSN 1551-0123
Vik Pant — Oracle Corporation, USA
William P. Wagner — Villanova University, USA
Information Institute Publishing, Washington DC, USA




The distribution of cryptographic keys is one of the primary factors that determine the security and efficacy of a cryptosystem. An otherwise unbreakable cipher, such as the one time pad, can be breached during the key distribution process. The classical methods of distributing cryptographic keys (i.e., via human couriers or electronic means) are inherently insecure. Since they are subject to compromise — to achieve certainly verifiable cryptography a system is needed that can guarantee the inviolability of the key distribution process. Quantum key distribution, or QKD, is the science of distributing cryptographic keys using the properties of quantum physics. Combined with the perfectly secret one time pad cipher a QKD cryptosystem can achieve certainly verifiable cryptography. This paper introduces the reader to the domain of QKD and the aspects of quantum physics that relate to it.




Quantum Key Distribution, Quantum Physics, Cryptography, Cryptosystem, Cryptographic Cipher, Secret Key, One Time Pad




Bauer, F.L. (2002). "Decrypted Secrets: Methods and Maxims of Cryptology", 3rd rev. and updated edition, pg. 28

Beals, T.R., Sanders, B.C (2008). "Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network", Arxiv preprint, arXiv:0803.2919

Bigelow, N. (2001) "Squeezing entanglement", Nature, Vol. 409, pg. 27

Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S. (2007)."Unconditionally secure cryptosystem based on quantum cryptography", Working paper.

Crepeau, C. (1994). "Quantum Oblivious Transfer", Journal of Modern Optics, Volume 41, Issue 12

Deng, F.-G., Long, G.L. (2004). "Secure Direct Communication with a Quantum One-Time-Pad", Published in Physical Review A, 69 052319

Diffie, W., Hellman, M. (1976). "New directions in cryptography", IEEE Transactions on Information Theory, Volume: 22 Issue: 6, pp. 644-654

Ekert, A.K. (1991). ”Quantum cryptography based on Bell's Theorem,” Physical Review Letters, 67(6), pp. 661-663

Feynman, R. (1982). “Simulating physics with computers”, International Journal of Theoretical Physics, 21(6&7), pp. 467-488

Feynman, R.P. (1988). "QED: The Strange Theory of Light and Matter"

Gribbin, J. (1984). “In Search of Schrödinger's Cat: Quantum Physics and Reality”

Hughes, R.J, Buttler, W.T., Kwiat, P.G., Luther, G.G., Morgan, G.L., Nordholt, J.E., Peterson, C.G., Simmons, C.M. (1997). “Secure communication using quantum cryptography”, Photonic Quantum Computing

Hwang, W.-Y. (2005). "Bell’s inequality, random sequence, and quantum key distribution", Physical Review A, 71 (5)

Ilic, N. "The Ekert Protocol" (2007). Journal of PHY334, Number 334 1

Larsson, J.-A (2002). "A practical trojan horse for Bell-inequality-based quantum cryptography", Quantum Information Computing, 2:434

Lo, H. Lutkenhaus, N. (2007). “Quantum Cryptography: from Theory to Practice”, Working paper

Mercuri, R. T., Neumann, P.G. (2003). "Security by obscurity", Communications of the ACM, Volume 46, Issue 11, pg. 160

National Institute of Standards and Technology (NIST), (2006). "Joint Quantum Institute Created by University of Maryland, NIST and NSA", NIST News Release

Ouellette, J. (2005). "Quantum Key Distribution", The Industrial Physicist Poppe, A., Fedrizzi, A., Ursin, R., Bohm, H.R., Lorunser, T., Maurhardt, O., Peev, M. Suda, M., Kurtsiefer, C., Weinfurter, H. Jennewein, SECOQC (EU), (2007) "White Paper on Quantum Key Distribution and Cryptography"

Secure Communication based on Quantum Cryptography (2007). "White Paper on Quantum Key Distribution and Cryptography"

Shannon, C.E. (1946). "Communication Theory of Secrecy Systems", A Mathematical Theory of Cryptography

Tanenbaum, A.S. (2002). “Computer Networks Fourth Edition”, Prentice Hall

Wang, X., Zhan, M., Lai, C.H. ,Gang, H. (2004). "Error function attack of chaos synchronization based encryption schemes", Chaos: An Interdisciplinary Journal of Nonlinear Science, 128 (2004), DOI: 10.1063/1.1633492

Y. Zeilinger, A. (2004). "Practical quantum key distribution with polarization entangled photons", OPTICS EXPRESS, 3865 /Vol. 12/No. 16/