Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: Rashmi Rani, Thakur Kalyani Kalikant
DOI Link: https://doi.org/10.22214/ijraset.2024.92943
Certificate: View Certificate
Quantum-cryptography represents a revolutionary advancement in the field of secure correspondence, leveraging the principles of quantum-mechanics to ensure unprecedented levels of security. This review paper provides a comprehensive exploration of both the foundational principles and advanced techniques underpinning quantum cryptographic systems. We begin by examining the theoretical foundations, including quantum key distribution (QKD) protocols such as BB84 and E91, and the critical role of entanglement and superposition in these processes. The paper then delves into the latest advancements and techniques in the field, including device-independent QKD, quantum cryptographic networks, and post-quantum cryptographic methods designed to be resilient against quantum computer attacks. Additionally, we discuss practical implementation challenges and the current state of experimental quantum cryptography. By synthesizing recent research findings and technological developments, this review aims to provide a thorough comprehension of the current environment and future directions of quantum cryptography, highlighting its potential to revolutionize secure communications in the quantum era.
I. INTRODUCTION
Exploring the realm of quantum cryptography unveils a fascinating landscape of security measures built upon the foundational principles of quantum mechanics. Quantum cryptography, as a field, capitalizes on the inherent properties of quantum mechanics to provide safe routes for communication that are seemingly impervious to hacking attempts. Dissimilar to conventional cryptographic strategies that depend on numerical calculations for encryption, quantum cryptography use the laws of physical science, specifically quantum indeterminacy, to detect any unauthorized access or tampering in transmitted data, thereby rendering it virtually un-hackable [1]. By amalgamating the principles of quantum mechanics with cryptography, quantum cryptography pioneers a new era in secure information transfer, where security is not contingent on the computational power of adversaries but on the fundamental properties of quantum-mechanics such as the uncertainty principle and superposition [2][1]. One of the most conspicuous utilizations of quantum cryptography is quantum key conveyance, a procedure that not just gives an information-theoretically secure solution to the key exchange problem but also has the capability to detect eavesdropping activities, ensuring the integrity of communication channels [3].
While quantum cryptography marks a significant advancement in information security, it is essential to acknowledge that no cryptographic method, including quantum cryptography, is infallible. Quantum cryptography, despite its achievements, operates under a set of key assumptions and limitations, making its safety conditionally secure in practice [3]. Nonetheless, the groundbreaking features of quantum cryptography, such as enabling cryptographic tasks impossible through classical communication and the impossibility of copying data encoded in a quantum-state due to the no-cloning theorem, underscore its pivotal role in enhancing cybersecurity measures in the digital age [3].
II. LIMITATIONS OF MODERN CRYPTOSYSTEMS
Despite the widespread adoption and advancements in modern cryptographic systems, several inherent limitations and challenges persist:
A. Computational Complexity and Performance Overhead
Modern cryptosystems, especially public-key algorithms like RSA and ECC (Elliptic Curve Cryptography), rely heavily on complex mathematical problems. These require substantial computational power and can result in significant performance overhead, making them less suitable for resource-constrained environments such as IoT devices.
B. Vulnerability to Quantum Computing
As quantum figuring innovation progresses, the security of many existing cryptographic calculations is progressively undermined. Quantum-computers can solve problems like integer factorization (on which RSA is based) and discrete logarithms (underpinning ECC) exponentially faster than classical computers, potentially rendering these cryptosystems obsolete.
C. Key Management Challenges
Powerful key administration is urgent for the security of cryptographic frameworks. The secure generation, distribution, storage, and revocation of keys present significant logistical and security challenges. Improper key management can lead to vulnerabilities, such as key leakage or unauthorized access.
D. Side-Channel Attacks
Modern cryptosystems are susceptible to side-channel attacks, which exploit physical characteristics of the encryption process to gain information about the cryptographic keys. These attacks do not target the cryptographic algorithm itself but rather the implementation, making them difficult to detect and mitigate.
E. Implementation Flaws and Human Error
The security of cryptographic systems can be compromised by implementation flaws, such as bugs in the software or hardware, and human error. Poor coding practices, inadequate testing, and insufficient understanding of cryptographic principles can introduce vulnerabilities that attackers can exploit.
F. Dependency on Trusted Third Parties
Many cryptographic protocols rely on trusted third parties, such as Certificate Authorities (CAs) in Public Key Infrastructure (PKI). The trustworthiness and security of these entities are critical, and any compromise or failure can have widespread implications for the security of the cryptosystem.
G. Scalability Issues
As the number of users and devices increases, managing cryptographic keys and ensuring secure communication can become increasingly complex and resource-intensive. Scalability is a significant concern for large-scale deployments, such as national or global networks.
H. Long-Term Security
Ensuring the long-term security of encrypted data is challenging. As computational power increases and new attack vectors are discovered, cryptographic algorithms that are secure today may not remain so in the future. This necessitates ongoing research and periodic updates to cryptographic standards and practices.
III. QUANTUM CRYPTOGRAPHY: A NEW ERA
It represents a transformative headway in the field of secure correspondence, marking the beginning of a new era in cryptographic practices.
By utilizing the standards of quantum mechanics, quantum cryptography offers unprecedented levels of security that address many of the limitations inherent in classical cryptosystems.
A. Fundamental Principles
B. Advantages over Classical Cryptosystems
C. Technological Developments
D. Practical Implementations and Challenges
E. Future Directions
IV. QUANTUM CRYPTOGRAPHY KEY GENERATION PROTOCOLS
A. Related Work
Recent advancements in quantum cryptography have focused on various QKD protocols, each presenting unique benefits and challenges. Nurhadi et al. [5] examined multiple QKD protocols, including BB84, E91, BBM92, B92, the Six-State Protocol, DPS, SARG04, COW, and S13. Their findings indicate that the B92 protocol has the smallest probability of error, highlighting its potential for secure communications. Kalra and Poonia [6] proposed a variation of the BB84 protocol that doubles its capacity while maintaining almost half the error rate, showing promise for enhanced efficiency in quantum key distribution.
Sasaki et al. [7] focused on single-photon source protocols, demonstrating secure key distribution based on fundamental quantum mechanical principles. Meanwhile, Dirks et al. [8] explored the GEOQKD system, achieving a maximum tolerable loss of 41 dB per channel, indicating significant improvements in maintaining signal integrity over long distances.
Williams et al. [9] explored time-receptacle encoding with entrapped photon matches, exhibiting successful time synchronization and snoop discovery abilities. Schimpf et al. [10] used GaAs QD for QKD, which kept up with devotion to the Chime state at higher temperatures however confronted difficulties with the corruption of ensnarement at these temperatures. Amer et al. [11] identified limitations in quantum repeater QKD grid networks, particularly in the success probability of Bell State Measurements (BSM) and the rate of decoherence, underlining areas for future improvement.
Ding et al. [12] contributed to the development of quantum communication technologies by applying a random forest algorithm for QKD parameter optimization, enhancing the protocol's overall effectiveness. Dhoha et al. [13] confirmed the effectiveness of the BB84 protocol for both QKD and QBC protocols, reinforcing its foundational role in quantum cryptography. Yao et al. [14] analyzed entropic uncertainty relations, providing insights into the behavior of ideal states for QRNG and QKD, further advancing our understanding of these fundamental processes.
In the realm of post-quantum cryptography, Mujdei et al. [15] proposed new attack strategies against Kyber, Saber, and NTRU, addressing side-channel attack vulnerabilities. Imana et al. [16] introduced an InvBRLWE-based encryption method that improves area-time complexities and power efficiency, showcasing advancements in cryptographic performance. Prakasan et al. [17] examined the NTRU and Falcon algorithms, highlighting their ability to enhance security without significant performance trade-offs, making them viable options for robust encryption.
Sajimon et al. [18] optimized the implementations of Kyber, Saber, Dilithium, and Falcon for IoT devices, achieving a balance between security and performance crucial for resource-constrained environments. Abidin et al. [19] explored the application of QKD in the DARPA Quantum Network, emphasizing the promising nature of quantum cryptography for securing cyberspace and addressing contemporary security challenges.
B. Quantum Cryptography Key Generation Protocols
Quantum cryptography key generation protocols have revolutionized secure communication by leveraging the principles of quantum mechanics. Various protocols have been developed, each with unique features and capabilities to enhance security and efficiency.
Quantum cryptography goes beyond securing communication between individuals and is now being incorporated into entire networks to protect sensitive data from cyber threats. With the rise of quantum computing, the urgency for quantum-resistant cryptography is increasing. Researchers are developing post-quantum security measures to counteract the potential threat posed by quantum computers to existing cryptographic systems. The future of quantum cryptography is closely linked to the advancements in quantum computing, as new cryptographic protocols are being explored to endure the computational capabilities of quantum machines. In summary, quantum cryptography leads the way in secure communication technologies, offering unmatched security through quantum mechanics. By delving into the basics, advanced techniques, and future applications of quantum cryptography, we can see its significant potential to transform information security. As the field progresses, quantum cryptography is set to revolutionize how we communicate and protect sensitive information in a highly connected world.
[1] Best Quantum Cryptography Courses Online with Certificates [2024] | Coursera. (n.d.) retrieved May28,2024, from www.coursera.org/courses?query=quantum%20cryptography [2] EITC/IS/QCF Quantum Cryptography Fundamentals. (n.d.) retrieved May 28, 2024, from eitca.org [3] Quantum Cryptography, Explained. (n.d.) retrieved May 28, 2024, from quantumxc.com/blog/quantum-cryptography-explained/ [4] C. Bennett and G. Brassard, in Proceedings of IEEE, International Conference on Computers, Systems. [5] A. I. Nurhadi and N. R. Syambas, “Quantum key distribution (qkd) protocols: A survey,” in 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1–5, IEEE, 2018. [6] M. Kalra and R. C. Poonia, “Design a new protocol and compare with bb84 protocol for quantum key distribution,” in Soft Computing for Problem Solving: SocProS 2017, Volume 2, pp. 969–978, Springer, 2019. [7] T. Sasaki, Y. Yamamoto, and M. Koashi, “Practical quantum key distribution protocol without monitoring signal disturbance,” Nature, vol. 509, no. 7501, pp. 475–478, 2014. [8] B. Dirks, I. Ferrario, A. Le Pera, D. V. Finocchiaro, M. Desmons, D. de Lange, H. de Man, A. J. Meskers, J. Morits, N. M. Neumann, et al., “Geoqkd: quantum key distribution from a geostationary satellite,” in International Conference on Space Optics—ICSO 2020, vol. 11852, pp. 222–236, SPIE, 2021. [9] J. Williams, M. Suchara, T. Zhong, H. Qiao, R. Kettimuthu, and R. Fukumori, “Implementation of quantum key distribution and quantum clock synchronization via time bin encoding,” in Quantum Computing, Communication, and Simulation, vol. 11699, pp. 16– 25, SPIE, 2021. [10] C. Schimpf, S. Manna, S. F. Covre da Silva, M. Aigner, and A. Rastelli, “Entanglement-based quantum key distribution with a blinking-free quantum dot operated at a temperature up to 20 k,” Advanced Photonics, vol. 3, no. 6, pp. 065001–065001, 2021. [11] O. Amer, W. O. Krawec, and B. Wang, “Efficient routing for quantum key distribution networks,” in 2020 IEEE International Conference on Quantum Computing and Engineering (QCE), pp. 137–147, IEEE, 2020. [12] H.-J. Ding, J.-Y. Liu, C.-M. Zhang, and Q. Wang, “Predicting optimal parameters with random forest for quantum key distribution,” Quantum Information Processing, vol. 19, pp. 1–8, 2020. [13] A.-M. Dhoha, A.-K. Mashael, A.-A. Ghadeer, A.- A. Manal, M. Al Fosail, and N. Nagy, “Quantum cryptography on ibm qx,” in 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6, IEEE, 2019. [14] K. Yao, W. O. Krawec, and J. Zhu, “Quantum sampling for finite key rates in high dimensional quantum cryptography,” IEEE Transactions on Information Theory, vol. 68, no. 5, pp. 3144–3163, 2022. [15] C. Mujdei, L. Wouters, A. Karmakar, A. Beckers, J. M. B. Mera, and I. Verbauwhede, “Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication,” ACM Transactions on Embedded Computing Systems, 2022. [16] J. L. Imana, P. He, T. Bao, Y. Tu, and J. Xie, “Efficient hardware arithmetic for inverted binary ring-lwe based post-quantum cryptography,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, no. 8, pp. 3297–3307, 2022. [17] A. Prakasan, K. Jain, and P. Krishnan, “Authenticated encryption in the quantum key distribution classical channel using post-quantum cryptography,” in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 804–811, IEEE, 2022. [18] P. Sajimon, K. Jain, and P. Krishnan, “Analysis of post-quantum cryptography for internet of things,” in 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 387– 394, IEEE, 2022. [19] S. Abidin, A. Swami, E. Ramirez-As´?s, J. Alvarado, Tolentino, R. K. Maurya, and N. Hussain, “Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (mcc),” Materials Today: Proceedings, vol. 51, pp. 508–514, 2022.
Copyright © 2024 Rashmi Rani, Thakur Kalyani Kalikant. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET62943
Publish Date : 2024-05-29
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here