1/19/2024 0 Comments Eve burst error r cgTherefore, user B, typically designated Bob informs user A, usually named Alice in literature, about bases he used, and Alice provides feedback advising when incompatible measurement bases have been used. The initial post-processing step is called a sifting phase, and it is used to detect those qubits for which adequate polarization measurement bases have been used on both sides. The overall process is aimed at establishing symmetric keys on both sides of the link in a safe manner. It includes steps that need to be implemented for all types of protocols , exchanging only the accompanying information that helps in the profiling of raw keys. All further communication is performed over a public channel, and it is often denoted as post-processing. The primary difference between these categories is reflected in the method of preparing and generating photons over a quantum channel .Ī quantum channel is used only to exchange qubits, and it provides the QKD protocol with raw keys. The procedure for establishing a key is defined by QKD protocol, and three basic categories are distinguished: the oldest and widespread group of discrete-variable protocols (BB84, B92, E91, SARG04), efficient continuous-variable (CV-QKD) protocols and distributed-phase-reference coding (COW, DPS) . Principally, information is encoded in a photon’s polarization a single polarized photon is referred to as a qubit (quantum bit) which cannot be split, copied or amplified without introducing detectable disturbances. Quantum cryptography focuses on photons (particles of light), using some of their properties to act as an information carrier. A QKD link can be realized only to a certain distance and at certain rates since it involves usage of two channels: quantum/optical and public/classical. Unlike approaches based on mathematical constraints whose security depends on the attacker’s computational and communication resources, QKD does not put a limit on the available resources but limits the length of the link implementation . QKD provides an effective solution for resolving the cryptographic key establishment problem by relying on the laws of quantum physics.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |