Tutorial  Certainly Verifiable Cryptography Using the Verifiable Uncertainty of Quantum Physics: A Primer on Quantum Key Distribution (QKD)
Full text  View 
Purchase 

Source  Journal of Information Systems Security Volume 7, Number 1 (2011)
Pages 48–79
ISSN 15510123 (Print)ISSN 15510808 (Online) 

Authors  Vik Pant — Oracle Corporation, USA
William P. Wagner — Villanova University, USA


Publisher  Information Institute Publishing, Washington DC, USA 
Abstract
The distribution of cryptographic keys is one of the primary factors that determine the security and efficacy of a cryptosystem. An otherwise unbreakable cipher, such as the one time pad, can be breached during the key distribution process. The classical methods of distributing cryptographic keys (i.e., via human couriers or electronic means) are inherently insecure. Since they are subject to compromise — to achieve certainly verifiable cryptography a system is needed that can guarantee the inviolability of the key distribution process. Quantum key distribution, or QKD, is the science of distributing cryptographic keys using the properties of quantum physics. Combined with the perfectly secret one time pad cipher a QKD cryptosystem can achieve certainly verifiable cryptography. This paper introduces the reader to the domain of QKD and the aspects of quantum physics that relate to it.
Keywords
Quantum Key Distribution, Quantum Physics, Cryptography, Cryptosystem, Cryptographic Cipher, Secret Key, One Time Pad
References
Bauer, F.L. (2002). "Decrypted Secrets: Methods and Maxims of Cryptology", 3rd rev. and updated edition, pg. 28
Beals, T.R., Sanders, B.C (2008). "Distributed Relay Protocol for Probabilistic InformationTheoretic Security in a RandomlyCompromised Network", Arxiv preprint, arXiv:0803.2919
Bigelow, N. (2001) "Squeezing entanglement", Nature, Vol. 409, pg. 27
Chung, Y.F., Wu, Z.Y., Lai, F., Chen, T.S. (2007)."Unconditionally secure cryptosystem based on quantum cryptography", Working paper.
Crepeau, C. (1994). "Quantum Oblivious Transfer", Journal of Modern Optics, Volume 41, Issue 12
Deng, F.G., Long, G.L. (2004). "Secure Direct Communication with a Quantum OneTimePad", Published in Physical Review A, 69 052319
Diffie, W., Hellman, M. (1976). "New directions in cryptography", IEEE Transactions on Information Theory, Volume: 22 Issue: 6, pp. 644654
Ekert, A.K. (1991). ”Quantum cryptography based on Bell's Theorem,” Physical Review Letters, 67(6), pp. 661663
Feynman, R. (1982). “Simulating physics with computers”, International Journal of Theoretical Physics, 21(6&7), pp. 467488
Feynman, R.P. (1988). "QED: The Strange Theory of Light and Matter"
Gribbin, J. (1984). “In Search of Schrödinger's Cat: Quantum Physics and Reality”
Hughes, R.J, Buttler, W.T., Kwiat, P.G., Luther, G.G., Morgan, G.L., Nordholt, J.E., Peterson, C.G., Simmons, C.M. (1997). “Secure communication using quantum cryptography”, Photonic Quantum Computing
Hwang, W.Y. (2005). "Bell’s inequality, random sequence, and quantum key distribution", Physical Review A, 71 (5)
Ilic, N. "The Ekert Protocol" (2007). Journal of PHY334, Number 334 1
Larsson, J.A (2002). "A practical trojan horse for Bellinequalitybased quantum cryptography", Quantum Information Computing, 2:434
Lo, H. Lutkenhaus, N. (2007). “Quantum Cryptography: from Theory to Practice”, Working paper
Mercuri, R. T., Neumann, P.G. (2003). "Security by obscurity", Communications of the ACM, Volume 46, Issue 11, pg. 160
National Institute of Standards and Technology (NIST), (2006). "Joint Quantum Institute Created by University of Maryland, NIST and NSA", NIST News Release
Ouellette, J. (2005). "Quantum Key Distribution", The Industrial Physicist Poppe, A., Fedrizzi, A., Ursin, R., Bohm, H.R., Lorunser, T., Maurhardt, O., Peev, M. Suda, M., Kurtsiefer, C., Weinfurter, H. Jennewein, SECOQC (EU), (2007) "White Paper on Quantum Key Distribution and Cryptography"
Secure Communication based on Quantum Cryptography (2007). "White Paper on Quantum Key Distribution and Cryptography"
Shannon, C.E. (1946). "Communication Theory of Secrecy Systems", A Mathematical Theory of Cryptography
Tanenbaum, A.S. (2002). “Computer Networks Fourth Edition”, Prentice Hall
Wang, X., Zhan, M., Lai, C.H. ,Gang, H. (2004). "Error function attack of chaos synchronization based encryption schemes", Chaos: An Interdisciplinary Journal of Nonlinear Science, 128 (2004), DOI: 10.1063/1.1633492
Y. Zeilinger, A. (2004). "Practical quantum key distribution with polarization entangled photons", OPTICS EXPRESS, 3865 /Vol. 12/No. 16/