Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.
Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.
QKD protocol integration into network security suites for critical infrastructures
DAMO, ELIA
2023/2024
Abstract
Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.File | Dimensione | Formato | |
---|---|---|---|
Damo_Elia.pdf
accesso riservato
Dimensione
8.48 MB
Formato
Adobe PDF
|
8.48 MB | Adobe PDF |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/71616