Advertisement

Abstract

Quantum cryptography could be integrated in various existing concepts and protocols to secure communications that require very high level of security. The aim of this paper is to analyse the use of quantum cryptography within PPP. We introduce basic concepts of the Point to Point Protocol; we propose a solution that integrates quantum key distribution into PPP. An example is given to demonstrate the operational feasibility of this solution

Keywords

PPP Quantum Key Distribution (QKD) within PPP unconditional security transmission data-link layer security enhance PPP security feasibility study application domain 

References

  1. 1.
    Alléaume R (2004). “Réalisation expérimentale de sources de photons uniques, caractérisation et application à la cryptographie quantique” (Secoqc partner)Google Scholar
  2. 2.
    Bennet, C; Brassard, G (1984). IEEE International Conference on Computers, Systems, and Signal Processing. IEEE Press, LOS ALAMITOSGoogle Scholar
  3. 3.
    Bennet, (1992). C Quantum Cryptography: Uncertainty in the Service of Privacy. Science 257.Google Scholar
  4. 4.
    Donald S. Bethune and William P. Risk (2002). “AutoCompensating quantum cryptography”. New journal of physics 4 (2002) 42.1–42.15 URL: http://www.iop.org/EJ/article/1367-2630/4/1/342/nj2142.htmlCrossRefGoogle Scholar
  5. 5.
    Clark, C. W; Bienfang, J. C; Gross, A. J; Mink, A; Hershman, B. J; Nakassis, A; Tang, X; Lu, R; Su, D. H; Williams, C. J; Hagley E. W; Wen, J (2000). “Quantum key distribution with 1.25 Gbps clock synchronization”, Optics Express.Google Scholar
  6. 6.
    Crypto-Gram (March 2005). “SHA-1 Broken”. Schneier, B. March 15th 2005.Google Scholar
  7. 7.
    Artur Ekert (1991). “Quantum Cryptography based on Bell’s Theorem”. Physical Review Letters. URL: http://prola.aps.org/abstract/PRL/v67/i6/p661_1Google Scholar
  8. 8.
    Elliott, C (2002). “Building the quantum network”. New Journal of Physics 4 (46.1–46.12)CrossRefGoogle Scholar
  9. 9.
    Elliott, C; Pearson, D; Troxel, G (2003). “Quantum Cryptography in Practice”.Google Scholar
  10. 10.
    Gisin, N; Ribordy, G; Tittel, W; Zbinden, H. (2002). “Quantum Cryptography”. Reviews of Modern Physics 74 (2002): http://arxiv.org/PS_cache/quant-ph/pdf/0101/0101098.pdfGoogle Scholar
  11. 11.
    Ghernaouti Hélie, S; Sfaxi, M.A; Ribordy, G; Gay, O (2005). “Using Quantum Key Distribution within IPSEC to secure MAN communications”. MAN 2005 conference.Google Scholar
  12. 12.
    Grosshans, Van Assche, Wenger, Brouri, Cerf, Grangier (2003). “Quantum key distribution using gaussian-modulated coherent states” Letter to nature. URL: http://www.mpq.mpg.de/Theorygroup/CIRAC/people/grosshans/papers/Nat421_238.pdfGoogle Scholar
  13. 13.
    Guenther, C (2003) “The Relevance of Quantum Cryptography in Modern Cryptographic Systems”. GSEC Partical Requirements (v1.4b). http://www.giac.org/practical/GSEC/Christoph_Guenther_GSEC.pdfGoogle Scholar
  14. 14.
    R. Hughes, J. Nordholt. D. Derkacs, C. Peterson, (2002). “Practical free-space quantum key distribution over 10km in daylight and at night”. New journal of physics 4 (2002) 43.1–43.14. URL: http://www.iop.org/EJ/abstract/1367-2630/4/1/343/CrossRefGoogle Scholar
  15. 15.
    IdQuantique (2004) “A Quantum Leap for Cryptography”. http://www.idquantique.com/files/introduction.pdfGoogle Scholar
  16. 16.
    Internet Assigned Numbers Authority-IAN A (2005). http://www.iana.org/numbers.htmlGoogle Scholar
  17. 17.
    Knight, P (2005). “Manipulating cold atoms for quantum information processing”. QUPON conference Vienna 2005.Google Scholar
  18. 18.
    Labouret, G (2000). “IPSEC: présentation technique”. Hervé Schauer Consultants (HSC). URL: www.hsc.frGoogle Scholar
  19. 19.
    Le journal Le monde (march 2005). “Menace sur la signature lcronique”. march the 5th 2005.Google Scholar
  20. 20.
    Lo, H.K; Chau, H.F. (1999). “Unconditional security of quantum key distribution over arbitrarily long distances”. Science 283: http://arxiv.org/PS_cache/quant-ph/9803/9803006.pdfGoogle Scholar
  21. 21.
    Magic Technologies (2004). “Quantum Information Solutions for real world”. http://www.magiqtech.com/products/index.phpGoogle Scholar
  22. 22.
    Mayers, D (1998). “Unconditionnal Security in Quantum Cryptography”. J. Assoc. Comput. Math. 48, 351MathSciNetGoogle Scholar
  23. 23.
    Paterson, K.G; Piper, f; Schack, R (2004). “Why Quantum Cryptography?”. http://eprint.iacr.org/2004/156.pdfGoogle Scholar
  24. 24.
    Riguidel, M; Dang-Minh, D; Le-Quoc, C; Nguyen-Toan, L; Nguyen-Thanh, M (2004). “Quantum crypt-Work Package I”. ENST/EEC/QC.04.06.WP1B. (Secoqc partner)Google Scholar
  25. 25.
    Rivest, R.L; Shamir, A; Adleman, L.M (1978). “A Method of Obtaining Digital Signature and Public-Key Cryptosystems”. Communication of the ACM 21 no. 2 1978.Google Scholar
  26. 26.
    Schneier, B (1996). “Applied Cryptography” Second Edition. New York: John Wiley & Sons, 1996Google Scholar
  27. 27.
    Shannon, C.E (1949). “Communication theory of secrecy systems”. Bell System Technical Journal 28-4. URL: http://www.cs.ucla.edu/jkong/research/security/shannon.htmlGoogle Scholar
  28. 28.
    Tonomura, A (2005). “Quantum phenomena observed using electrons”. QUPON conference Vienna 2005.Google Scholar
  29. 29.
    Wootters, W.K; Zurek, W.H (1982). “A single quantum cannot be cloned”. Nature, 299, 802CrossRefGoogle Scholar
  30. 30.
    Zemor, G (2001) “Cours de cryptographie”, Editeur: CassiniGoogle Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Solange Ghernaouti-Hélie
    • 1
  • Mohamed Ali Sfaxi
    • 1
  1. 1.Inforge-HECuniversity of LausanneSwitzerland

Personalised recommendations