Quantum Key Distribution (QKD) is a technology within the field of Information-Theoretic Security (ITS) that leverages the principles of Quantum Mechanics (QM) to distribute cryptographic keys between A and B. QKD ensures that any potential attacker, E, cannot gain any information about the key without being detected by the legitimate parties. To achieve this, QKD establishes a physical, point-to-point quantum link between Alice and Bob. However, this link is not perfect and can be affected by various physical imperfections, including attenuation, polarization drift and background noise. These imperfections can introduce errors in the transmitted quantum states. To obtain a secure and identical key between A and B, some additional steps are performed after transmission, such as sifting, error estimation, error correction and privacy amplification. For the optimization of the entire process, some parameters, like hold-off time, filter time window and raw key block length, can be adjusted to provide the best trade-off between security, correctness and speed in the generation of the key. The aim of this work is to analyze the three-state QKD protocol implemented by ThinkQuantum and to extend their QUKY software by developing a prototypal version that evaluates the channel imperfections and automatically selects the optimal parameters for a given level of attenuation and noise. This prototypal implementation serves as a proof of concept for automating parameter selection and enhancing the adaptability of ThinkQuantum devices under real operating conditions.

Quantum Key Distribution (QKD) is a technology within the field of Information-Theoretic Security (ITS) that leverages the principles of Quantum Mechanics (QM) to distribute cryptographic keys between A and B. QKD ensures that any potential attacker, E, cannot gain any information about the key without being detected by the legitimate parties. To achieve this, QKD establishes a physical, point-to-point quantum link between Alice and Bob. However, this link is not perfect and can be affected by various physical imperfections, including attenuation, polarization drift and background noise. These imperfections can introduce errors in the transmitted quantum states. To obtain a secure and identical key between A and B, some additional steps are performed after transmission, such as sifting, error estimation, error correction and privacy amplification. For the optimization of the entire process, some parameters, like hold-off time, filter time window and raw key block length, can be adjusted to provide the best trade-off between security, correctness and speed in the generation of the key. The aim of this work is to analyze the three-state QKD protocol implemented by ThinkQuantum and to extend their QUKY software by developing a prototypal version that evaluates the channel imperfections and automatically selects the optimal parameters for a given level of attenuation and noise. This prototypal implementation serves as a proof of concept for automating parameter selection and enhancing the adaptability of ThinkQuantum devices under real operating conditions.

Optimal parameter selection for a QKD protocol in noisy channels

VANGHETTI, ANDREA
2024/2025

Abstract

Quantum Key Distribution (QKD) is a technology within the field of Information-Theoretic Security (ITS) that leverages the principles of Quantum Mechanics (QM) to distribute cryptographic keys between A and B. QKD ensures that any potential attacker, E, cannot gain any information about the key without being detected by the legitimate parties. To achieve this, QKD establishes a physical, point-to-point quantum link between Alice and Bob. However, this link is not perfect and can be affected by various physical imperfections, including attenuation, polarization drift and background noise. These imperfections can introduce errors in the transmitted quantum states. To obtain a secure and identical key between A and B, some additional steps are performed after transmission, such as sifting, error estimation, error correction and privacy amplification. For the optimization of the entire process, some parameters, like hold-off time, filter time window and raw key block length, can be adjusted to provide the best trade-off between security, correctness and speed in the generation of the key. The aim of this work is to analyze the three-state QKD protocol implemented by ThinkQuantum and to extend their QUKY software by developing a prototypal version that evaluates the channel imperfections and automatically selects the optimal parameters for a given level of attenuation and noise. This prototypal implementation serves as a proof of concept for automating parameter selection and enhancing the adaptability of ThinkQuantum devices under real operating conditions.
2024
Optimal parameter selection for a QKD protocol in noisy channels
Quantum Key Distribution (QKD) is a technology within the field of Information-Theoretic Security (ITS) that leverages the principles of Quantum Mechanics (QM) to distribute cryptographic keys between A and B. QKD ensures that any potential attacker, E, cannot gain any information about the key without being detected by the legitimate parties. To achieve this, QKD establishes a physical, point-to-point quantum link between Alice and Bob. However, this link is not perfect and can be affected by various physical imperfections, including attenuation, polarization drift and background noise. These imperfections can introduce errors in the transmitted quantum states. To obtain a secure and identical key between A and B, some additional steps are performed after transmission, such as sifting, error estimation, error correction and privacy amplification. For the optimization of the entire process, some parameters, like hold-off time, filter time window and raw key block length, can be adjusted to provide the best trade-off between security, correctness and speed in the generation of the key. The aim of this work is to analyze the three-state QKD protocol implemented by ThinkQuantum and to extend their QUKY software by developing a prototypal version that evaluates the channel imperfections and automatically selects the optimal parameters for a given level of attenuation and noise. This prototypal implementation serves as a proof of concept for automating parameter selection and enhancing the adaptability of ThinkQuantum devices under real operating conditions.
QKD
Cybersecurity
Cryptography
File in questo prodotto:
File Dimensione Formato  
Vanghetti_Andrea.pdf

accesso aperto

Dimensione 7.17 MB
Formato Adobe PDF
7.17 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/101999