Limit search to available items
Book Cover
E-book

Title Applied quantum cryptography / C. Kollmitzer, M. Pivk (eds.)
Published Heidelberg ; New York : Springer, ©2010

Copies

Description 1 online resource (xii, 214 pages) : illustrations (some color)
Series Lecture notes in physics ; 797
Lecture notes in physics ; 797.
Contents Preliminaries -- Quantum Key Distribution -- Adaptive Cascade -- Attack Strategies on QKD Protocols -- QKD Systems -- Statistical Analysis of QKD Networks in Real-Life Environment -- QKD networks based on Q3P -- Quantum-Cryptographic Networks from a Prototype to the Citizen -- The Ring of Trust Model
Summary Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel technology. Only a few years ago quantum cryptography - or better: quantum key distribution - was the domain of basic research laboratories at universities. But during the last few years things changed. QKD left the laboratories and was picked up by more practical oriented teams that worked hard to develop a practically applicable technology out of the astonishing results of basic research. One major milestone towards a QKD technology was a large research and development project funded by the European Commission that aimed at combining quantum physics with complementary technologies that are necessary to create a technical solution: electronics, software, and network components were added within the project SECOQC (Development of a Global Network for Secure Communication based on Quantum Cryptography) that teamed up all expertise on European level to get a technology for future encryption. The practical application of QKD in a standard optical fibre network was demonstrated October 2008 in Vienna, giving a glimpse of the future of secure communication. Although many steps have still to be done in order to achieve a real mature technology, the corner stone for future secure communication is already laid. QKD will not be the Holy Grail of security, it will not be able to solve all problems for evermore. But QKD has the potential to replace one of the weakest parts of symmetric encryption: the exchange of the key. It can be proven that the key exchange process cannot be corrupted and that keys that are generated and exchanged quantum cryptographically will be secure for ever (as long as some additional conditions are kept). This book will show the state of the art of Quantum Cryptography and it will sketch how it can be implemented in standard communication infrastructure. The growing vulnerability of sensitive data requires new concepts and QKD will be a possible solution to overcome some of today's limitations
Bibliography Includes bibliographical references and index
Notes English
Print version record
Subject Data encryption (Computer science)
Cryptography
Quantum theory.
Particles (Nuclear physics)
Quantum Theory
Elementary Particles
Electronic Data Processing
particle physics.
Physique.
Cryptography
Data encryption (Computer science)
Quantenkryptologie
Quantenkryptologie.
Form Electronic book
Author Kollmitzer, Christian.
Pivk, M. (Mario)
ISBN 9783642048319
3642048315
1280382007
9781280382000
9786613559913
6613559911