Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.

Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.

QKD protocol integration into network security suites for critical infrastructures

DAMO, ELIA
2023/2024

Abstract

Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.
2023
QKD protocol integration into network security suites for critical infrastructures
Since 1984, researchers have theorized about ways to use quantum mechanics to generate random cryptographic keys, in order to be used in computer networks. This process is known as Quantum Key Distribution (QKD), and during the years, many protocols have been described, but only in the last two decades have researchers been able to realistically implement them. This bachelor’s degree thesis addresses the issue of the integration of a Quantum Key Distribution protocol into the network security suite of a critical infrastructure. This is done in order to maximize its security level, without compromising its robustness and its ability to communicate at an acceptable rate, given the context in which the infrastructure works.
Cyber Security
QKD
Computer Networks
File in questo prodotto:
File Dimensione Formato  
Damo_Elia.pdf

accesso riservato

Dimensione 8.48 MB
Formato Adobe PDF
8.48 MB Adobe PDF

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/71616