ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A BASIC QUANTUM KEY DISTRIBUTION PROTOCOL

Journal: Bulletin of Cherkasy State Technological University (Vol.1, No. 23)

Publication Date:

Authors : ;

Page : 128-140

Keywords : Twin Field protocol; quantum channel multiplexing; quantum identification; quantum channels; quantum cryptography; key distribution protocol stack;

Source : Download Find it from : Google Scholarexternal

Abstract

Over time, the complexity of threats that can be perpetrated against critical infrastructure is increasing, including cyberattacks, large-scale failures, terrorist attacks, etc. The confidentiality of data processed and transmitted within critical infrastructure is a key aspect of its security. Traditional cryptography methods, although reliable, are becoming vulnerable to advanced computing and quantum capabilities of attackers. For this reason, the relevance of studying and applying quantum cryptography in critical infrastructure is becoming increasingly important. They are highly resistant to attacks related to computational aspects and provide untraceability of keys and data due to the principles of uncertainty. However, they also require complex technical implementation and further research for widespread implementation. Quantum cryptography can provide reliable protection against current and future attacks while maintaining data confidentiality and user identification. However, it is important to choose the right methods and tools to ensure the maximum level of data confidentiality, taking into account the characteristics of the network. The article describes in detail the processes of improving the quantum key distribution protocol using quantum identification and quantum channel multiplexing methods, describes the mathematical apparatus of the improved method, and defines the stages of forming the key distribution protocol stack. The proposed improved method of quantum key distribution creates the possibility of its universal application under conditions of uncertainty, providing fast operation speed and a higher level of data security.

Last modified: 2023-12-23 03:32:40