Abstract
Quantum cryptography could be integrated in various existing concepts and protocols to secure communications that require very high level of security. The aim of this paper is to analyse the use of quantum cryptography within PPP. We introduce basic concepts of the Point to Point Protocol; we propose a solution that integrates quantum key distribution into PPP. An example is given to demonstrate the operational feasibility of this solution
This work has been done within the framework of the European research project : SECOQC - www.secoqc.net
Chapter PDF
Similar content being viewed by others
Keywords
References
Alléaume R (2004). “Réalisation expérimentale de sources de photons uniques, caractérisation et application à la cryptographie quantique” (Secoqc partner)
Bennet, C; Brassard, G (1984). IEEE International Conference on Computers, Systems, and Signal Processing. IEEE Press, LOS ALAMITOS
Bennet, (1992). C Quantum Cryptography: Uncertainty in the Service of Privacy. Science 257.
Donald S. Bethune and William P. Risk (2002). “AutoCompensating quantum cryptography”. New journal of physics 4 (2002) 42.1–42.15 URL: http://www.iop.org/EJ/article/1367-2630/4/1/342/nj2142.html
Clark, C. W; Bienfang, J. C; Gross, A. J; Mink, A; Hershman, B. J; Nakassis, A; Tang, X; Lu, R; Su, D. H; Williams, C. J; Hagley E. W; Wen, J (2000). “Quantum key distribution with 1.25 Gbps clock synchronization”, Optics Express.
Crypto-Gram (March 2005). “SHA-1 Broken”. Schneier, B. March 15th 2005.
Artur Ekert (1991). “Quantum Cryptography based on Bell’s Theorem”. Physical Review Letters. URL: http://prola.aps.org/abstract/PRL/v67/i6/p661_1
Elliott, C (2002). “Building the quantum network”. New Journal of Physics 4 (46.1–46.12)
Elliott, C; Pearson, D; Troxel, G (2003). “Quantum Cryptography in Practice”.
Gisin, N; Ribordy, G; Tittel, W; Zbinden, H. (2002). “Quantum Cryptography”. Reviews of Modern Physics 74 (2002): http://arxiv.org/PS_cache/quant-ph/pdf/0101/0101098.pdf
Ghernaouti Hélie, S; Sfaxi, M.A; Ribordy, G; Gay, O (2005). “Using Quantum Key Distribution within IPSEC to secure MAN communications”. MAN 2005 conference.
Grosshans, Van Assche, Wenger, Brouri, Cerf, Grangier (2003). “Quantum key distribution using gaussian-modulated coherent states” Letter to nature. URL: http://www.mpq.mpg.de/Theorygroup/CIRAC/people/grosshans/papers/Nat421_238.pdf
Guenther, C (2003) “The Relevance of Quantum Cryptography in Modern Cryptographic Systems”. GSEC Partical Requirements (v1.4b). http://www.giac.org/practical/GSEC/Christoph_Guenther_GSEC.pdf
R. Hughes, J. Nordholt. D. Derkacs, C. Peterson, (2002). “Practical free-space quantum key distribution over 10km in daylight and at night”. New journal of physics 4 (2002) 43.1–43.14. URL: http://www.iop.org/EJ/abstract/1367-2630/4/1/343/
IdQuantique (2004) “A Quantum Leap for Cryptography”. http://www.idquantique.com/files/introduction.pdf
Internet Assigned Numbers Authority-IAN A (2005). http://www.iana.org/numbers.html
Knight, P (2005). “Manipulating cold atoms for quantum information processing”. QUPON conference Vienna 2005.
Labouret, G (2000). “IPSEC: présentation technique”. Hervé Schauer Consultants (HSC). URL: www.hsc.fr
Le journal Le monde (march 2005). “Menace sur la signature lcronique”. march the 5th 2005.
Lo, H.K; Chau, H.F. (1999). “Unconditional security of quantum key distribution over arbitrarily long distances”. Science 283: http://arxiv.org/PS_cache/quant-ph/9803/9803006.pdf
Magic Technologies (2004). “Quantum Information Solutions for real world”. http://www.magiqtech.com/products/index.php
Mayers, D (1998). “Unconditionnal Security in Quantum Cryptography”. J. Assoc. Comput. Math. 48, 351
Paterson, K.G; Piper, f; Schack, R (2004). “Why Quantum Cryptography?”. http://eprint.iacr.org/2004/156.pdf
Riguidel, M; Dang-Minh, D; Le-Quoc, C; Nguyen-Toan, L; Nguyen-Thanh, M (2004). “Quantum crypt-Work Package I”. ENST/EEC/QC.04.06.WP1B. (Secoqc partner)
Rivest, R.L; Shamir, A; Adleman, L.M (1978). “A Method of Obtaining Digital Signature and Public-Key Cryptosystems”. Communication of the ACM 21 no. 2 1978.
Schneier, B (1996). “Applied Cryptography” Second Edition. New York: John Wiley & Sons, 1996
Shannon, C.E (1949). “Communication theory of secrecy systems”. Bell System Technical Journal 28-4. URL: http://www.cs.ucla.edu/jkong/research/security/shannon.html
Tonomura, A (2005). “Quantum phenomena observed using electrons”. QUPON conference Vienna 2005.
Wootters, W.K; Zurek, W.H (1982). “A single quantum cannot be cloned”. Nature, 299, 802
Zemor, G (2001) “Cours de cryptographie”, Editeur: Cassini
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Ghernaouti-Hélie, S., Sfaxi, M.A. (2007). Upgrading PPP security by Quantum Key Distribution. In: Gaïti, D. (eds) Network Control and Engineering for QoS, Security and Mobility, IV. NetCon 2005. IFIP — The International Federation for Information Processing, vol 229. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-49690-0_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-49690-0_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-49689-4
Online ISBN: 978-0-387-49690-0
eBook Packages: Computer ScienceComputer Science (R0)