دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: مکانیک کوانتومی ویرایش: نویسندگان: Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan سری: ISBN (شابک) : 9789811086182, 9811086184 ناشر: Springer سال نشر: 2018 تعداد صفحات: 226 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 6 مگابایت
در صورت تبدیل فایل کتاب Multi-photon Quantum Secure Communication به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ارتباطات ایمن کوانتومی چند فوتونی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Acknowledgements Contents List of Figures 1 Introduction 1.1 Cryptography 1.1.1 Short History 1.1.2 Classical Cryptography Limitations 1.1.3 Quantum Cryptography as a Solution 1.2 Quantum Cryptography 1.3 Quantum World 1.3.1 Polarization Concept 1.3.2 Quantum Cryptography 1.4 Post-quantum Cryptography 1.4.1 Lattice-Based Cryptography 1.4.2 Multivariate Cryptography 1.4.3 Hash-Based Cryptography 1.4.4 Code-Based Cryptography 1.5 Scope and Contributions of This Book 1.6 Organization of This Book References 2 Mathematical Background 2.1 Basic Concepts in Quantum Information 2.1.1 Quantum State and Qubit 2.1.2 Multiple Qubits 2.1.3 Qubit Operations 2.1.4 Mixed States and Density Operators 2.1.5 No-Cloning Theorem 2.1.6 Quantum Measurement 2.2 Quantum Theory of Photons 2.2.1 Quantization of Electromagnetic Field 2.2.2 Photon States 2.2.3 Representing Qubit Using Polarization States of a Photon 2.2.4 Multi-photon Polarization States and Stokes Vector 2.2.5 Polarization Rotation and Mueller Matrices for Multi-photon States 2.3 Summary References 3 Quantum Key Distribution 3.1 Introduction 3.2 Single Photon-Based QKD Protocols 3.2.1 The BB84 Protocol 3.2.2 The B92 Protocol 3.3 Use of Weak Coherent States in QKD 3.3.1 Photon-Number-Splitting Attack 3.3.2 The SARG04 Protocol 3.3.3 The Decoy-State Method 3.3.4 The COW Protocol 3.4 Entangled Photon-Based QKD Protocol 3.4.1 Quantum Entanglemententangled state and Bell’s Inequality 3.4.2 The E91 Protocol 3.5 Challenges of Current Approaches of QKD 3.6 Summary References 4 Secure Communication Based on Quantum Noise 4.1 Introduction 4.2 Keyed Communication in Quantum Noise (KCQ) 4.2.1 KCQ Coherent-State Key Generation with Binary Detection 4.2.2 Current Experimental Status 4.2.3 Comparison Between QKD and KCQ 4.3 Security Analysis of KCQ 4.3.1 Information-Theoretic (IT) Security 4.3.2 Complexity-Theoretic (CT) Security 4.4 Summary References 5 The Three-Stage Protocol: Its Operation and Implementation 5.1 Introduction 5.2 Principle of Operation 5.3 Implementation of the Three-Stage Protocol Over Free Space Optics (FSO) 5.3.1 Rotation Transformations 5.3.2 Half Wave Plate Operation 5.3.2.1 Choice of the Rotation Angle 5.4 Summary References 6 The Multi-stage Protocol 6.1 Introduction 6.2 The Multi-stage Protocol Polarization Hopping 6.2.1 Comparison with Single-Photon Protocols 6.3 Man-in-the-Middle Attack 6.4 Key/Message Expansion Multi-stage Protocol 6.4.1 Multi-stage Protocol Using an Initialization Vector 6.4.2 Operation of the Four-Variables Three-Stage Protocol 6.4.3 Implementation of the Four-Variables Three-Stage Protocol 6.5 Summary References 7 Preliminary Security Analysis of the Multi-stage Protocol 7.1 Introduction 7.2 Background Knowledge 7.2.1 Helstrom Discrimination 7.3 Photon Number Splitting Attack (PNS) 7.3.1 Helstrom Discrimination 7.3.2 Fock States 7.4 Trojan Horse Attack 7.5 Hardware Countermeasures 7.6 Conclusion References 8 Security Analysis of the Multi-stage Protocol 8.1 Introduction 8.2 Intercept-Resend (IR) and Photon Number Splitting (PNS) Attacks 8.3 Authentication 8.4 Amplification Attack 8.5 Security and Key Rate Efficiency 8.6 Summary References 9 Application of the Multi-stage Protocol in IEEE 802.11i 9.1 Introduction 9.2 IEEE 802.11i 9.2.1 The Four-Way Handshake 9.3 Integration of QKD for Key Distribution in IEEE 802.11i 9.3.1 Disadvantages of the Approach Described to Integrate QKD into IEEE 802.11i 9.4 Hybrid Three-Stage Protocol 9.4.1 Quantum Handshake Using the Three-Stage Protocol 9.4.2 Quantum Handshake Using the Four-Variable Three-Stage Protocol 9.4.3 Quantum Handshake Using the Single-Stage Protocol 9.4.4 Hardware Implementation 9.5 Software Implementation 9.5.1 Multi-agent Approach in BB84 9.5.2 Multi-agent Approach in Multi-photon Tolerant Protocols 9.5.3 Analysis of the Quantum Handshake Using Three-Stage Protocol and Its Variants 9.6 Summary References 10 Intrusion Detection on Optical Fibers 10.1 Intrusion Detection and Encryption 10.2 Tapping of Optical Fibers 10.3 Polarization Properties of Light [1] 10.4 Experimental Setup 10.5 Experimental Results 10.6 Real-Life Applications of the Intrusion Detection System 10.7 Summary References 11 Secure Key Transfer Over the Polarization Channel 11.1 Symmetric Key Encryption 11.2 The Advanced Encryption System 11.3 A Review of the Polarization Properties of Light 11.4 Polarization Transfer Function and Fiber Characterization 11.5 The System 11.5.1 Method of Implementation 11.6 Experimental Results 11.7 Data Rate and Calibration Time 11.8 Summary References 12 An Ultra-Secure Router-to-Router Key Exchange System 12.1 Introduction 12.2 Related Work 12.2.1 Discrete Logarithms 12.2.2 Contemporary Key Distribution Protocols 12.3 The Proposed Protocol 12.3.1 Multi-stage Protocol 12.3.2 Man in the Middle Attack on Multi-stage Protocols 12.4 Proposed Protocol Using an Initialization Vector and Its Cryptographic Strength 12.4.1 Description 12.4.2 Mode of Operation 12.4.3 A Two-Stage Protocol 12.4.4 Braiding Concept 12.4.5 Man in the Middle Attack on a Multi-stage Protocol Using an Initialization Vector 12.4.6 Characteristics of the Proposed Protocol 12.5 Alternatives to the Proposed Approach 12.5.1 Alternative I—RSA 12.5.2 Alternative II—AES 12.5.3 Alternative III—ECC 12.6 Summary References