Advertisement

Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment

  • Solange Ghernaouti-Hélie
  • Mohamed Ali Sfaxi
Part of the Communications in Computer and Information Science book series (CCIS, volume 3)

Abstract

Protocols and applications could profit of quantum cryptography to secure communications. The applications of quantum cryptography are linked to telecommunication services that require very high level of security such as bank transactions.

The aim of this paper is to present the possibility to use quantum cryptography in critical financial transactions, to analyse the use of quantum key distribution within IPSEC to secure these transactions and to present the estimated performances of this solution.

After having introduced basic concepts in quantum cryptography, we describe a scenario of using quantum key distribution in bank transactions in Switzerland. Then, we propose a solution that integrate quantum key distribution into IPSEC. A performance analysis is done to demonstrate the operational feasibility of this solution.

Keywords

Security guarantee Quantum cryptography Key management secure financial transactions IPSEC performances 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ghernaouti-Hélie, S., Sfaxi, M.A, Hauser, A., Riguidel, M., Alléaume, R.: Business model: advantages, scenarios, patents and laws related to quantum cryptography. Secoqc project deliverable (2004)Google Scholar
  2. Alléaume, R.: Réalisation expérimentale de sources de photons uniques, caractérisation et application à la cryptographie quantique (Secoqc partner) (2004)Google Scholar
  3. Bennet, C., Brassard, G.: IEEE International Conference on Computers, Systems, and Signal Processing. IEEE Press, Los Alamitos (1983)Google Scholar
  4. Bennet, C.: Quantum Cryptography: Uncertainty in the Service of Privacy. Science 257 (1992)Google Scholar
  5. Bethune, D.S., Risk, W.P.: AutoCompensating quantum cryptography. New journal of physics 4, 1–42 (2002), http://www.iop.org/EJ/article/1367-2630/4/1/342/nj2142.html CrossRefGoogle Scholar
  6. Clark, C.W., Bienfang, J.C., Gross, A.J., Mink, A., Hershman, B.J., Nakassis, A., Tang, X., Lu, R., Su, D.H., Williams, C.J., Hagley, E.W., Wen, J.: Quantum key distribution with 1.25 Gbps clock synchronization, Optics Express (2000)Google Scholar
  7. Ekert, A.: Quantum Cryptography based on Bell’s Theorem. Physical Review Letters (1991), http://prola.aps.org/abstract/PRL/v67/i6/p661_1
  8. Elliott, C.: Building the quantum network. New Journal of Physics 4 46.1-46.12 (2002)Google Scholar
  9. Elliott, C., Pearson, D., Troxel, G.: Quantum Cryptography in Practice (2003)Google Scholar
  10. Freebsd people. IPsec outline. URL: http://people.freebsd.org/~julian/IPsec_4_Dummies.html
  11. freesoft,IPsec Overview. (2004). URL http://www.freesoft.org/CIE/Topics/141.htm
  12. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum Cryptography. Reviews of Modern Physics 74 (2002), http://arxiv.org/PS_cache/quant-ph/pdf/0101/0101098.pdf
  13. Grosshans,Van Assche, Wenger, Brouri, Cerf, Grangier: Quantum key distribution using gaussian-modulated coherent states. Letter to nature (2003), http://www.mpq.mpg.de/Theorygroup/CIRAC-/people/grosshans/papers/Nat421_238.pdf
  14. Hughes, R., Nordholt, J., Derkacs, D., Peterson, C.: Practical free-space quantum key distribution over 10km in daylight and at night. New journal of physics 4, 1–43 (2002), http://www.iop.org/EJ/abstract/1367-2630/4/1/343/ CrossRefGoogle Scholar
  15. Labouret, G.: IPsec: présentation technique. Hervé Schauer Consultants (HSC) (2000), http://www.hsc.fr
  16. Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283 (1999), http://arxiv.org/PS_cache/quant-ph/9803/9803006.pdf
  17. Mason, A.: IPsec Overview Part Five: Security Associations. Cisco Press (2002), http://www.ciscopress.com/articles/printerfriendly.asp?p=25443
  18. Mayers, D.: Unconditionnal Security in Quantum Cryptography. J. Assoc. Comput. Math. 48, 351 (1998)CrossRefGoogle Scholar
  19. Paterson, K.G., Piper, F., Schack, R.: Why Quantum Cryptography? (2004), http://eprint.iacr.org/2004/156.pdf
  20. Riguidel, M., Dang-Minh, D., Le-Quoc, C., Nguyen-Toan, L., Nguyen-Thanh, M.: Quantum crypt- Work Package I. ENST/EEC/QC.04.06.WP1B (Secoqc partner) (2004)Google Scholar
  21. Rivest, R.L., Shamir, A., Adleman, L.M.: A Method of Obtaining Digital Signature and Public-Key Cryptosystems. Communication of the ACM 21(2) (1978)Google Scholar
  22. Wootters, W.K, Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802 (1982)CrossRefGoogle Scholar
  23. IdQuantique, A Quantum Leap for Cryptography (2004), http://www.idquantique.com/files/introduction.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Solange Ghernaouti-Hélie
    • 1
  • Mohamed Ali Sfaxi
    • 1
  1. 1.HEC - University of Lausanne, 1015Switzerland

Personalised recommendations