System of distribution of keys by means of quantum cryptography to evade attacks of type "Man in the middle"

  • Edward Paul Guillén Universidad Militar Nueva Granada
  • José Jaime Navarro Gasca Universidad Militar Nueva Granada
Keywords: quantum cryptography, quantum mechanics, quantum key distribution, cryptography, network security

Abstract

Nowadays, it is possible to design very secure systems for key distribution. According to quantum cryptography, which is based on the properties of quantum mechanics, quantum key distribution systems are the most secure way to exchange private keys. This document leads you towards the understanding of these systems.

Author Biographies

Edward Paul Guillén, Universidad Militar Nueva Granada

Universidad Militar Nueva Granada GISSIC.

José Jaime Navarro Gasca, Universidad Militar Nueva Granada

Universidad Militar Nueva Granada GISSIC.

Downloads

Download data is not yet available.

Languages:

es

Support agencies:

Universidad Militar Nueva Granada

Author Biographies

Edward Paul Guillén, Universidad Militar Nueva Granada

Universidad Militar Nueva Granada GISSIC.

José Jaime Navarro Gasca, Universidad Militar Nueva Granada

Universidad Militar Nueva Granada GISSIC.

References

ELLIOT, C. PEARSON, D. TROXEL, G. Quantum Cryptography in Practice. BBN Technologies. 2002.12.p

LOMONACO, S. J. A Quick Glance at Quantum Cryptography. University of Maryland Baltimore County. 1998.54.p

BOHM, H. R. A compact source for polarization entangled photon pairs. Vienna University of Technology. 2003.68.p

MAKAROV, V. HJELME, D. R. Faked states attack on quantum cryptosystems. Norwegian University of Science and Technology. 2005.15.p

REDMOND, W. Is the future of cryptography in qubits?. GIAC Security Essentials Certification. 2002.12.p

VAKHITOV, A. MAKAROV, V. HJELME, D. R. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography. Norwegian University of Science and Technology. 2001.16.p

MULLINS J. Making Unbreakable Code. IEEE Spectrum.2002.6.p

SCHILLER, C. No Single Killer App for PKI. GSEC.2002.28.p

WOOD, D. PKI, The What, The Why, and The How.GSEC – SANS Institute. 2002.18.p

GISIN, N. RIBORDY, G. TITTEL, W. ZBINDEN, H. Quantum Cryptography. Group of Applied Physics - University of Geneva. 2002.51.p

ELLIOT, C. Quantum Cryptography. IEEE Security and Privacy. 2004.5.p

KLISTNER, T. Quantum Cryptography: Is your data safe even when somebody looks?. GSEC. 2001.13.p

BRYLEVSKI, A. Quantum Key Distribution: Real Time Compensation of Interferometer Phase Drift. NTNU Department of Physical Electronics. 2003.45.p

PATERSON, K. G. PIPER, F. AND SCHACKT, R. Why Quantum Cryptography?. University of London. 2005.5.p

JAIN, R. RADHAKRISHNAN, J. SEN, P. Prior entanglement, message compression and privacy in quantum communication. Proceedings of the Twentieth Annual IEEE Conference on Computational Complexity (CCC’05). 2005.12.p

AUBURN, B. R. Quantum Encryption – A Means to perfect security?. SANS Institute. 2003.14.p

GOMEZ, J. P. NAVARRO, J. J. QUINTERO, R. Criptografía Cuántica.Universidad Militar Nueva Granada. 2005.11.p

CASTAÑEDA, M. G. DE-GEUS. J. E. Introducción a la física moderna. Universidad Nacional de Colombia. 1993.421.p

RITTER, T. Learning about Criptography [en línea]. 2 de Septiembre de 2003 [Citado en 22/02/2006]. Disponible en Internet :http://www.ciphersbyritter.com/LEARNING.HTM> .

ANSHEL, M. Computer Security and Criptography [en línea]. [Citado en 22/02/2006]. Disponible en Internet : http://www-cs.engr.ccny.cuny.edu/~csmma/#scintro>.

How to Cite
Guillén, E. P., & Navarro Gasca, J. J. (2006). System of distribution of keys by means of quantum cryptography to evade attacks of type "Man in the middle". Ciencia E Ingenieria Neogranadina, 16(2), 64–73. https://doi.org/10.18359/rcin.1235
Published
2006-12-01
Section
ARTICLES

Altmetric

QR Code

Some similar items: