30 August 2010 Quantum stream cipher beyond the Shannon limit of symmetric key cipher and the possibility of experimental demonstration
Author Affiliations +
Proceedings Volume 7815, Quantum Communications and Quantum Imaging VIII; 78150P (2010); doi: 10.1117/12.860117
Event: SPIE Optical Engineering + Applications, 2010, San Diego, California, United States
Abstract
The security in the next generation optical network which realizes "Cloud Computing System Service with data center" is one of the most important problems. In such a network, the encryption in physical layer which provide super security and small delay is a preferable. It has to be applicable, however, to very high speed data because the basic link is operated at 2.5 Gbit/sec ~ 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y00) is a completely new type of random cipher, which can exceed the Shannon limit of the symmetric key cipher. This paper extends some theoretical results on the security for quantum stream cipher such as Y00 protocol and generalized Y00. First, the conditions to exceed the Shannon limit are summarized. We formulate a generalized secret capacity in the sense of wire tap channel supported by secret key to clarify a cipher exceeding the Shannon limit. The generalized secret capacities for space communication and fiber communication based on the generalized Y00 are given. When the relaxation of physical constraint or device limit of the eavesdropper is allowed, we point out that a cipher scheme exceeding the Shannon limit can be realized only by the conventional optical system.
© (2010) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Osamu Hirota, Takehisa Iwakoshi, Masaki Sohma, Fumio Futami, "Quantum stream cipher beyond the Shannon limit of symmetric key cipher and the possibility of experimental demonstration", Proc. SPIE 7815, Quantum Communications and Quantum Imaging VIII, 78150P (30 August 2010); doi: 10.1117/12.860117; https://doi.org/10.1117/12.860117
PROCEEDINGS
11 PAGES


SHARE
KEYWORDS
Computer security

Network security

Clouds

Computing systems

Current controlled current source

Data centers

Optical networks

RELATED CONTENT

Progress in Y 00 physical cipher for Giga bit sec...
Proceedings of SPIE (October 08 2014)
On localization attacks against cloud infrastructure
Proceedings of SPIE (May 28 2013)
Analysis on the security of cloud computing
Proceedings of SPIE (February 04 2011)

Back to Top