Professional Documents
Culture Documents
The Review of The Commercial Quantum Key Distribution System
The Review of The Commercial Quantum Key Distribution System
net/publication/334070231
CITATIONS READS
6 659
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Anton Pljonkin on 20 December 2019.
Abstract—A review of the existing commercial quantum must be absolutely random, its length must be greater than or
key distribution systems was conducted. The principle of equal to the length of the encoded message and the key can
operation of a fiber-optic quantum key distribution system be used only once.
with phase coding of photon states is described. The operation
of the system in the mode of forming quantum keys is Classical cryptographic systems often use only two rules
described. The synchronization process is analyzed, which out of three. For example, using pseudo-random processes
consists in detecting a time interval with an optical pulse. The when generating an encryption key. Or using a single
basic properties and parameters of auto-compensation encryption key multiple times. But more often two rules are
quantum key distribution system are reviewed. The images of violated at once: a standard length key is used to encrypt
the current stand of the quantum-cryptographic network are long messages repeatedly. Classic cryptosystems are
given. The stand includes two stations of the quantum key vulnerable.
distribution system with phase coding of photon states, two
servers and data transmission channels. It is shown that the Practical implementation of quantum cryptography is
formation of a quantum key in the experiment is carried out at based on the quantum key distribution systems. If existing
a rate of 500 bits per second. The length of the quantum encryption algorithms can be cracked by mathematical
communication channel in the experiment is 24 km. In this improvements, then quantum cryptography is the only way
case, the quantum channel consists of a conventional single- to solve the key distribution problem. At the heart of
mode optical fiber. Trends in the development of quantum key quantum cryptography lie the following statements: it is
distribution systems, as well as trends in the development of impossible to clone an unknown quantum state and it is
protocols for quantum cryptography was conducted. impossible to extract information about non-orthogonal
quantum states without perturbation. Consequently, any
Keywords— quantum key, algorithm, synchronization, measurement performed by an attacker will lead to a change
photon pulse in the quantum state of the information carrier. The laws of
I. INTRODUCTION quantum physics cannot be violated.
The main problem in the transfer of confidential In quantum cryptography, symmetric cryptosystems are
information is the distribution of the secret key between the common [3]. In these systems, only one key is used for
correspondents. To achieve absolute secrecy in the encryption and for deciphering confidential information.
transmission of messages is possible only by solving the Messages sent along the lines of quantum communication, in
problem of key distribution. To protect the data, various theory, can neither be intercepted nor copied. To date, real-
methods, algorithms and encryption protocols are used. The functioning quantum communication systems have been
security of existing telecommunications networks is limited created. The efforts of developers are now aimed at
by the computational capabilities of the attacker. increasing the range of communication and improving the
characteristics of fiber optic components.
The physical solution of the key distribution problem is
known as quantum cryptography and is based on the Quantum key distribution is a technology based on the
encoding of the quantum state of a single particle [1, 2]. laws of quantum physics to create a string of random bits for
Quantum cryptography, as a promising direction, solving the two remote users, which is used as a cryptographic key. It is
problem of key distribution has already taken a worthy place believed that quantum key distribution systems can meet the
among systems that provide confidential information requirements of absolute secrecy when encrypting messages.
transmission. The essence of quantum cryptography lies in A symmetric cryptosystem generates a shared secret key and
the reliable distribution of a single key between legitimate distributes it among legitimate users. Such a key, or rather a
users. The attractiveness of the idea of quantum bit array, was called a "one-time notebook".
cryptography is to create an absolutely random secret key. Its
II. HISTORY OF QUANTUM CRYPTOGRAPHY
secrecy and the impossibility of an unobtrusive audition by
an unauthorized person are based on the laws of quantum The history of quantum cryptography began back in the
physics. In contrast to the classical methods of cryptography, late 1960s, when Columbia University student Steven
which are based on mathematical patterns and potentially Wiesner told Charles Bennett the idea of quantum banknotes.
lend themselves to deciphering. Now the research in the field They cannot be faked in principle, because it is excluded by
of quantum telecommunications is actively conducted. Even the laws of nature. The essence of the idea was to place
today, corporations are creating the first samples of quantum several quantum objects on each banknote. These can be, for
computers, which means that the future of classical example, traps with photons, each of which is polarized at a
cryptography is under threat. certain angle in one of two bases. Either at an angles of 0 and
90, or 45 and 135 degrees. The serial number is printed on a
To ensure the absolute secrecy of the cryptographic banknote, but the combination of polarizations and bases
scheme, it is necessary to fulfill certain conditions: the key