It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key generation and the exchange process. The well-known BB84 protocol (C. Bennet e G. Brassard 1984) uses the quantum property which states that orthogonally polarized states can be completely discriminated, thus can be used to codify information. The developed system adopts a properly costumized BB84 protocol. The hardware instrumentation includes two fast PCs with acquisition card, a 4-channels transmitter, 4 high-efficiency LED diodes, a receiver with 4 high-sensitivity avalanche photodiodes, and suitable optical devices. Transmitter and receiver have been realized by means of two custom electronic cards, that are driven by two separated PCs with suitable software devoted to the signal generation and decoding procedures. The system is a prototype that can be further improved in order to be used in end user money transactions and to allow each one to afford the quantum cryptography security level. The system can be further downsized to develop quantum cryptography circuits embeddable in mobile devices to ensure the maximum security in money transfer and controlled access.

Prototype of a Quantum Cryptography System for the End User / R. Pizzi, D. Rossetti - In: ACS'09 : Proceedings / [a cura di] R. Revetria, B. Mladenov, N. Mastorakis, N. - [s.l] : ACM, 2009 Oct. - ISBN 9789604741274. - pp. 93-96 (( Intervento presentato al 9. convegno International Conference on Applied Computer Science tenutosi a Genova nel 2009.

Prototype of a Quantum Cryptography System for the End User

R. Pizzi
;
2009

Abstract

It is known that the quantum cryptography protocols are able to detect immediately any attempt to attack the key generation and the exchange process. The well-known BB84 protocol (C. Bennet e G. Brassard 1984) uses the quantum property which states that orthogonally polarized states can be completely discriminated, thus can be used to codify information. The developed system adopts a properly costumized BB84 protocol. The hardware instrumentation includes two fast PCs with acquisition card, a 4-channels transmitter, 4 high-efficiency LED diodes, a receiver with 4 high-sensitivity avalanche photodiodes, and suitable optical devices. Transmitter and receiver have been realized by means of two custom electronic cards, that are driven by two separated PCs with suitable software devoted to the signal generation and decoding procedures. The system is a prototype that can be further improved in order to be used in end user money transactions and to allow each one to afford the quantum cryptography security level. The system can be further downsized to develop quantum cryptography circuits embeddable in mobile devices to ensure the maximum security in money transfer and controlled access.
No
English
Quantum; Cryptography; Photon; Polarization
Settore INF/01 - Informatica
Intervento a convegno
Esperti anonimi
Ricerca applicata
Pubblicazione scientifica
ACS'09 : Proceedings
R. Revetria, B. Mladenov, N. Mastorakis, N
ACM
ott-2009
93
96
4
9789604741274
Volume a diffusione internazionale
International Conference on Applied Computer Science
Genova
2009
9
Convegno internazionale
Intervento richiesto
Aderisco
R. Pizzi, D. Rossetti
Book Part (author)
reserved
273
Prototype of a Quantum Cryptography System for the End User / R. Pizzi, D. Rossetti - In: ACS'09 : Proceedings / [a cura di] R. Revetria, B. Mladenov, N. Mastorakis, N. - [s.l] : ACM, 2009 Oct. - ISBN 9789604741274. - pp. 93-96 (( Intervento presentato al 9. convegno International Conference on Applied Computer Science tenutosi a Genova nel 2009.
info:eu-repo/semantics/bookPart
2
Prodotti della ricerca::03 - Contributo in volume
File in questo prodotto:
File Dimensione Formato  
ACS-cryptography.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 381.03 kB
Formato Adobe PDF
381.03 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/568058
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 1
social impact