01-10-2016, 10:22 AM
1457160312-PerformanceEvaluationsofQuantumKeyDistributionSystem1.rtf (Size: 2.4 MB / Downloads: 9)
Q uantum key distribution (QKD) is the most mature application of the quantum informa-tion eld, o ering the means for two parties to gener-
ate secure cryptographic keying material. Employing the laws of quantum physics, QKD can detect eaves-droppers during the key generation process, in which unauthorized observation of quantum communication induces discernible errors. However, QKD is a nascent technology where real-world systems are constructed from nonideal components and deployed in uncertain operational environments, which can adversely impact system security and performance.
In this article, we study the performance impact of QKD implementation nonidealities and practical engi-neering limitations, evaluating three system examples using a modularized simulation framework. We also explore the QKD security–performance trade space to gain additional understanding of critical design tradeo s associated with interactions between physi-cal components and system-level considerations such as hardware, so ware, and protocols. Such evaluations provide insight and inform designers, researchers, and users when selecting among competing solutions
decision makers can also use them to guide future investments and developmental e orts.
Our research team focuses on bridging the gap between QKD theory and practice. eoretical and experimental physicists are working to advance QKD technology, but few are strongly focused on evaluating and improving the implementation of realized systems. For a general introduction to QKD, see Chip Elliot’s “Quantum Cryptography.”1
e Emergence
of QKD-Enabled Cryptography
QKD systems are emerging in the cryptographic solu-tion space, where many claim they function as uncondi-tionally secure key distribution devices. ( e term “key distribution” is somewhat misleading as QKD systems generate or grow shared secret keys from previously established keys and don’t merely distribute them.)
Figure 1 illustrates a QKD system con gured to generate shared secret key K for use in external bulk encryptors. e architecture consists of a sender Alice, a receiver Bob, an optical ber quantum channel, and a classical channel (that is, a conventional networked