Modeling, Simulation, and Performance Analysis of Decoy State Enabled Quantum Key Distribution Systems

Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show promise for high-security applications such as...

Full description

Saved in:
Bibliographic Details
Published inApplied sciences Vol. 7; no. 2; p. 212
Main Authors Mailloux, Logan, Grimaila, Michael, Hodson, Douglas, Engle, Ryan, McLaughlin, Colin, Baumgartner, Gerald
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show promise for high-security applications such as banking, government, and military environments. In this work, a detailed performance analysis of decoy state enabled QKD systems is conducted through model and simulation of several common decoy state configurations. The results of this study uniquely demonstrate that the decoy state protocol can ensure Photon Number Splitting (PNS) attacks are detected with high confidence, while maximizing the system’s quantum throughput at no additional cost. Additionally, implementation security guidance is provided for QKD system developers and users.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2076-3417
2076-3417
DOI:10.3390/app7020212