![]() QKD networks differ significantly from traditional telecommunication networks due to the specificity of QKD links and network organization. A suitable message authentication scheme, such as Wegman-Carter, should be combined with QKD to this end. Quantum Key Distribution, known as QKD, is based on the principles of quantum information theory and allows to establish information-secure cryptographic keys that do not depend on these constraints, at least on a protocol level. They are therefore under threat as computational power continues to increase and as quantum computing algorithms emerge that can break some widely used computationally complex mathematical problems in polynomial time. While the use of public key infrastructure based on computationally complex mathematical problems and assumptions about the computational power of eavesdroppers prevail, these belong to the group of theoretically breakable computational security solutions. Unlike studies focusing on optical channels and optical equipment, this survey focuses on the network aspect by considering network organization, routing and signaling protocols, simulation techniques, and a software-defined QKD networking approach.Įstablishing secure cryptographic keys through untrusted networks is one of the most fundamental cryptographic tasks. This article surveys previously applied methods, showing techniques for deploying QKD networks and current challenges of QKD networking. In previous years, several successful QKD networks have been created to test the implementation and interoperability of different practical solutions. ![]() A major aspect of quantum cryptography is the methodology of Quantum Key Distribution (QKD), which is used to generate and distribute symmetric cryptographic keys between two geographically separate users using the principles of quantum physics. ![]() The development of quantum electronics has led to the practical achievement of quantum devices that are already available on the market and waiting for their first application on a broader scale. The convergence of quantum cryptography with applications used in everyday life is a topic drawing attention from the industrial and academic worlds.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |