Applied Quantum Cryptography
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography – or better Quantum Key Distribution – was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone toward a QKD technology was a large research and dev- opment project funded by the European Commission that aimed at combining qu- tum physics with complementary technologies that are necessary to create a tech- cal solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future cryptography.
1101674715
Applied Quantum Cryptography
Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography – or better Quantum Key Distribution – was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone toward a QKD technology was a large research and dev- opment project funded by the European Commission that aimed at combining qu- tum physics with complementary technologies that are necessary to create a tech- cal solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future cryptography.
84.99 In Stock
Applied Quantum Cryptography

Applied Quantum Cryptography

Applied Quantum Cryptography

Applied Quantum Cryptography

Hardcover(2010)

$84.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography – or better Quantum Key Distribution – was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more practical-oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone toward a QKD technology was a large research and dev- opment project funded by the European Commission that aimed at combining qu- tum physics with complementary technologies that are necessary to create a tech- cal solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future cryptography.

Product Details

ISBN-13: 9783642048296
Publisher: Springer Berlin Heidelberg
Publication date: 02/19/2010
Series: Lecture Notes in Physics , #797
Edition description: 2010
Pages: 230
Product dimensions: 6.10(w) x 9.20(h) x 0.70(d)

Table of Contents

1 Introduction C. Kollmitzer 1

2 Preliminaries M. Pivk 3

2.1 Quantum Information Theory 3

2.2 Unconditional Secure Authentication 14

2.3 Entropy 19

References 21

3 Quantum Key Distribution M. Pivk 23

3.1 Quantum Channel 24

3.2 Public Channel 27

3.3 QKD Gain 45

3.4 Finite Resources 46

References 46

4 Adaptive Cascade S. Rass C. Kollmitzer 49

4.1 Introduction 49

4.2 Error Correction and the Cascade Protocol 49

4.3 Adaptive Initial Block-Size Selection 52

4.4 Fixed Initial Block-Size 53

4.5 Dynamic Initial Block-Size 56

4.6 Examples 65

4.7 Summary 66

References 68

5 Attack Strategies on QKD Protocols S. Schauer 71

5.1 Introduction 72

5.2 Attack Strategies in an Ideal Environment 73

5.3 Individual Attacks in an Realistic Environment 89

References 94

6 QKD Systems M. Suda 97

6.1 Introduction 97

6.2 QKD Systems 98

6.3 Summary 117

References 119

7 Statistical Analysis of QKD Networks in Real-Life Environment K. Lessiak J. Pilz 123

7.1 Statistical Methods 123

7.2 Results of the Experiments 127

7.3 Statistical Analysis 142

7.4 Summary 147

References 148

8 QKD Networks Based on Q3P O. Maurhart 151

8.1 QKD Networks 151

8.2 PPP 154

8.3 Q3P 155

8.4 Routing 167

8.5 Transport 168

References 170

9 Quantum-Cryptographic Networks from a Prototype to the Citizen P. Schartner C. Kollmitzer 173

9.1 The SECOQC Project 173

9.2 How to Bring QKD into the "Real" Life 176

9.3 Resumee 182

References 183

10 The Ring of Trust Model C. Kollmitzer C. Moesslacher 185

10.1 Introduction 185

10.2 Model of the Point of Trust Architecture 186

10.3 Communication in the Point of Trust Model 186

10.4 Exemplified Communications 194

10.5 A Medical Information System Based on the Ring of Trust 204

References 210

Index 211

From the B&N Reads Blog

Customer Reviews