System of distribution of keys by means of quantum cryptography to evade attacks of type "Man in the middle"
Abstract
Nowadays, it is possible to design very secure systems for key distribution. According to quantum cryptography, which is based on the properties of quantum mechanics, quantum key distribution systems are the most secure way to exchange private keys. This document leads you towards the understanding of these systems.Downloads
Languages:
esSupport agencies:
Universidad Militar Nueva GranadaReferences
ELLIOT, C. PEARSON, D. TROXEL, G. Quantum Cryptography in Practice. BBN Technologies. 2002.12.p
LOMONACO, S. J. A Quick Glance at Quantum Cryptography. University of Maryland Baltimore County. 1998.54.p
BOHM, H. R. A compact source for polarization entangled photon pairs. Vienna University of Technology. 2003.68.p
MAKAROV, V. HJELME, D. R. Faked states attack on quantum cryptosystems. Norwegian University of Science and Technology. 2005.15.p
REDMOND, W. Is the future of cryptography in qubits?. GIAC Security Essentials Certification. 2002.12.p
VAKHITOV, A. MAKAROV, V. HJELME, D. R. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography. Norwegian University of Science and Technology. 2001.16.p
MULLINS J. Making Unbreakable Code. IEEE Spectrum.2002.6.p
SCHILLER, C. No Single Killer App for PKI. GSEC.2002.28.p
WOOD, D. PKI, The What, The Why, and The How.GSEC – SANS Institute. 2002.18.p
GISIN, N. RIBORDY, G. TITTEL, W. ZBINDEN, H. Quantum Cryptography. Group of Applied Physics - University of Geneva. 2002.51.p
ELLIOT, C. Quantum Cryptography. IEEE Security and Privacy. 2004.5.p
KLISTNER, T. Quantum Cryptography: Is your data safe even when somebody looks?. GSEC. 2001.13.p
BRYLEVSKI, A. Quantum Key Distribution: Real Time Compensation of Interferometer Phase Drift. NTNU Department of Physical Electronics. 2003.45.p
PATERSON, K. G. PIPER, F. AND SCHACKT, R. Why Quantum Cryptography?. University of London. 2005.5.p
JAIN, R. RADHAKRISHNAN, J. SEN, P. Prior entanglement, message compression and privacy in quantum communication. Proceedings of the Twentieth Annual IEEE Conference on Computational Complexity (CCC’05). 2005.12.p
AUBURN, B. R. Quantum Encryption – A Means to perfect security?. SANS Institute. 2003.14.p
GOMEZ, J. P. NAVARRO, J. J. QUINTERO, R. Criptografía Cuántica.Universidad Militar Nueva Granada. 2005.11.p
CASTAÑEDA, M. G. DE-GEUS. J. E. Introducción a la física moderna. Universidad Nacional de Colombia. 1993.421.p
RITTER, T. Learning about Criptography [en línea]. 2 de Septiembre de 2003 [Citado en 22/02/2006]. Disponible en Internet :http://www.ciphersbyritter.com/LEARNING.HTM> .
ANSHEL, M. Computer Security and Criptography [en línea]. [Citado en 22/02/2006]. Disponible en Internet : http://www-cs.engr.ccny.cuny.edu/~csmma/#scintro>.