ABSTRACT
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) fiber. In this paper, we introduce quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our extensions to IPsec to integrate it with quantum cryptography.
- C. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 1984.]]Google Scholar
- C. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, no. 1, 1992, pp. 3--28.]] Google ScholarDigital Library
- R. Hughes et al, "Quantum cryptography over underground optical fibers," in N Koblitz, editor, Advances in Cryptology -- CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 329--342, 18--22 August 1996. Springer-Verlag.]] Google ScholarDigital Library
- D. Stucki, N. Gisin, O. Guinnard, G. Ribordy and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New J. Phys. 4 (July 2002) 41.]]Google ScholarCross Ref
- D. Bethune and W. Risk, "Autocompensating quantum cryptography," New J. Phys. 4 (July 2002) 42.]]Google ScholarCross Ref
- R. Hughes, J. Nordholt, D. Derkacs and C. Peterson, "Practical free-space quantum key distribution over 10 km in daylight and at night," New J. Phys. 4 (July 2002) 43.]]Google ScholarCross Ref
- J. Rarity, P. Tapster, P. Gorman and P. Knight, "Ground to satellite secure key exchange using quantum cryptography," New J. Phys. 4 (October 2002) 82.]]Google ScholarCross Ref
- G. Ribordy, J. Brendel, J-D. Gautier, N. Gisin, and H. Zbinden, "Long-distance entanglement-based quantum key distribution," Phys. Rev. A, v. 63, 012309 (13 December 2000).]]Google ScholarCross Ref
- W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. 84, 4737 (2000).]]Google ScholarCross Ref
- A. Ekert, "Quantum Cryptography Based on Bell's Theorem," Phys. Rev. Lett. 67, 661 (5 August 1991).]]Google ScholarCross Ref
- C. Bennett, 1992, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett. 68, 3121--3124.]]Google Scholar
- J. Franson, "Bell Inequality for Position and Time," Phys. Rev. Lett., 62, 2205 (8 May 1989).]]Google ScholarCross Ref
- G. Brassard, T. Mor, and B. Sanders, "Quantum crypto-graphy via parametric downconversion," quant-ph/9906074.]]Google Scholar
- D. Naik, C. Peterson, A. White, A. Berglund, and P. Kwiat, Phys. Rev. Lett. 84, 4733 (2000).]]Google ScholarCross Ref
- T. Jennewin, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 84, 4729 (2000).]]Google ScholarCross Ref
- D. Enzer, P. Hadley, R. Hughes, C. Peterson and P. Kwiat, "Entangled-photon six-state quantum cryptography," New J. Phys. 4 (July 2002) 45.]]Google ScholarCross Ref
- N. Gisin et al, "Quantum cryptography," Rev. Mod. Phys., Vol. 74, No. 1, January 2002.]]Google ScholarCross Ref
- C. Elliott, "Building the quantum network," New J. Phys. 4 (July 2002) 46.]]Google ScholarCross Ref
- G. Brassard and L. Salvail, "Secret key reconciliation by public discussion," Lect. Notes in Computer Science 765, 410. (1994).]]Google Scholar
- M. Wegman and L. Carter, "New Hash Functions and their Use in Authentication and Set Equality," J. Comp. Sys. Sci., 22, 265--279 (1981).]]Google ScholarCross Ref
- B. Slutsky, R. Rao, P. Sun, L. Tancevski, and S. Fainman, "Defense frontier analysis of quantum cryptographic systems," Applied Optics, vol. 37, no. 14, 1998, pp. 2869--2878.]]Google ScholarCross Ref
Index Terms
- Quantum cryptography in practice
Recommendations
Quantum cryptography: A survey
We survey some results in quantum cryptography. After a brief introduction to classical cryptography, we provide the quantum-mechanical background needed to present some fundamental protocols from quantum cryptography. In particular, we review quantum ...
Quantum Cryptography: A New Generation of Information Technology Security System
ITNG '09: Proceedings of the 2009 Sixth International Conference on Information Technology: New GenerationsQuantum cryptography is an emerging technology in which two parties can secure network communications by applying the phenomena of quantum physics. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. ...
Coherent state quantum key distribution based on entanglement sudden death
A method for quantum key distribution (QKD) using entangled coherent states is discussed which is designed to provide key distribution rates and transmission distances surpassing those of traditional entangled photon pair QKD by exploiting entanglement ...
Comments