To see the other types of publications on this topic, follow the link: Optical cryptography.

Dissertations / Theses on the topic 'Optical cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Optical cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gastaud, Gallagher Nicolas Hugh René. "Multi-Gigahertz Encrypted Communication Using Electro-Optical Chaos Cryptography." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19701.

Full text
Abstract:
Chaotic dynamics are at the center of multiple studies to perfect encrypted communication systems. Indeed, the particular time evolution nature of chaotic signals constitutes the fundamentals of their application to secure telecommunications. The pseudo random signal constitutes the carrier wave for the communication. The information coded on the carrier wave can be extracted with knowledge of the system dynamic evolution law. This evolution law consists of a second-order delay differential equation in which intervene the various parameters of the physical system setup. The set of precise parameter values forms the key, in a cryptographic sense, of the encrypted transmission. This thesis work presents the implementation of an experimental encryption system using chaos. The optical intensity of the emitter fluctuates chaotically and serves as carrier wave. A message of small amplitude, hidden inside the fluctuations of the carrier wave, is extracted from the transmitted signal by a properly tuned receiver. The influence of the message modulation format on the communication quality both in the back to back case and after propagation is investigated numerically.
APA, Harvard, Vancouver, ISO, and other styles
2

Funk, Andrew Christopher. "Cryptography using two-mode quantum mechanically squeezed optical pulses /." view abstract or download file of text, 2004. http://wwwlib.umi.com/cr/uoregon/fullcit?p3120623.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2004.<br>Typescript. Includes vita and abstract. Includes bibliographical references (leaves 204-209). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
3

Ray, Megan. "Verifying Optical Entanglement." Thesis, University of Oregon, 2013. http://hdl.handle.net/1794/13430.

Full text
Abstract:
We look at the problem of verifying optical entanglement for two types of states relevant to quantum information processing. One type occurs in Hong-Ou-Mandel interference and is relevant to quantum computing. The other type is time frequency entanglement which is useful for quantum key distribution. For these types of states the conventional methods of entanglement verification do not work well, and we develop new criteria and methods to verify entanglement of such states. Explicitly, one method takes into account the possible multimode character of two photons, while the other method takes into account the missing data that occur due to the finite range of detectors. This dissertation includes previously published and unpublished co-authored material.
APA, Harvard, Vancouver, ISO, and other styles
4

Park, Euibyung. "Nonclassicality and entanglement of optical fields and their application to quantum cryptography." Thesis, Queen's University Belfast, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.437550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rontani, Damien. "Communications with chaotic optoelectronic systems - cryptography and multiplexing." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/42810.

Full text
Abstract:
With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective ar- chitectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the influence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually cou- pled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transpos- ing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time- dependent.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.

Full text
Abstract:
La sécurité est un problème important dans la transmission et le stockage de l'image, tandis que le cryptage est un moyen d'assurer la sécurité qui est requise dans de nombreuses applications (télévision par câble, la communication d'images militaires, systèmes d'imagerie confidentielle, etc.). Toutefois, à l'instar du message texte, les données images présentent des caractéristiques spéciales telles que la haute capacité, la redondance et la haute corrélation entre les pixels, et nécessite souvent une transmission et des traitements temps réel pour certaines applications. Construire un système rapide et efficace de cryptographie d'images suscite un intérêt considérable. C'est dans ce contexte qu’ont été menés ces travaux thèse qui portent sur l’élaboration d’un corrélateur optique en termes de cryptage/décryptage des données pour son implémentation dans un montage optique innovant. L’objectif de ces travaux est de réaliser un système optique de chiffrement sur la base d'exploitation de transformation optique et de générateurs chaotiques. L'idée originale des travaux consiste à exploiter la non-linéarité des systèmes chaotiques comme clés de chiffrement pour les systèmes optiques de chiffrement d'images multispectrales. Dans ces travaux de thèse, nous avons proposés et évalués plusieurs chiffrements d'images à base d’un système hyperchaotique et de transformées optiques (gyrator, Fourier, Baker , Arnold et Gerchberg- Saxton) à partir d’un processus de cryptage reposant sur une décomposition composants RVB et un encodage dans un flux dimensionnel d’images couleurs. L'originalité des solutions de chiffrement adoptée reposent sur l'exploitation de signaux réellement aléatoires à travers la mise en œuvre de générateurs hyperchaotiques pour la génération de données aléatoires sous forme images comme base de matrices de clés de chiffrement. En effet, ces générateurs présentent des propriétés et des caractéristiques fondamentales en termes de cryptage car il présente une non-linéarité, une imprédictibilité et une extrême sensibilité aux conditions initiales les rendant très intéressantes pour le développement de clés de chiffrement par flot. L’algorithme mis en œuvre permet d'extraire en temps réel les caractéristiques de texture dans les différentes bandes spectrales d'images en vue d’évaluer et de détecter les teneurs potentielles en information et dont les transmissions doivent être sécurisée via une transmission optique<br>Optical information security is one of the most important research directions in information science and technology, especially in the field of copyright protection, confidential information transmission/storage and military remote sensing. Since double random phase encoding technology (DRPE) was proposed, optical image encryption technology has become the main topic of optical information security and it has been developed and studied deeply. Optical encryption techniques offer the possibility of high-speed parallel processing of two dimension image data and hiding information in many different dimensions. In this context, much significant research and investigation on optical image encryption have been presented based on DRPE or further optical operation, such as digital holography, Fresnel transform, gyrator transform. Simultaneously, the encrypted image has been extended from single gray image to double image, color image and multi-image. However, the hyperspectral image, as a significant element in military and commercial remote sensing, has not been deeply researched in optical encryption area until now. This work extends the optical encryption technology from color image to hyperspectral image. For better comprehension of hyperspectral image encryption, this work begins with the introduction and analysis of the characteristics of hyperspectral cube. Subsequently, several kinds of encryption schemes for color image, including symmetric and asymmetric cryptosystem, are presented individually. Furthermore, the optical encryption algorithms for hyperspectral cube are designed for securing both the spatial and spectral information simultaneously. Some numerical simulations are given to validate the performance of the proposed encryption schemes. The corresponding attack experiment results demonstrate the capability and robustness of the approaches designed in this work. The research in this dissertation provides reference for the further practicality of hyperspectral image encryption
APA, Harvard, Vancouver, ISO, and other styles
7

Rontani, Damien. "Nonlinear dynamics of photonic components. Chaos cryptography and multiplexing." Phd thesis, Supélec, 2011. http://tel.archives-ouvertes.fr/tel-00783267.

Full text
Abstract:
With the rapid development of optical communications and the increasing amount of data exchanged, it has become utterly important to provide effective architectures to protect sensitive data. The use of chaotic optoelectronic devices has already demonstrated great potential in terms of additional computational security at the physical layer of the optical network. However, the determination of the security level and the lack of a multi-user framework are two hurdles which have prevented their deployment on a large scale. In this thesis, we propose to address these two issues. First, we investigate the security of a widely used chaotic generator, the external cavity semiconductor laser (ECSL). This is a time-delay system known for providing complex and high-dimensional chaos, but with a low level of security regarding the identification of its most critical parameter, the time delay. We perform a detailed analysis of the influence of the ECSL parameters to devise how higher levels of security can be achieved and provide a physical interpretation of their origin. Second, we devise new architectures to multiplex optical chaotic signals and realize multi-user communications at high bit rates. We propose two different approaches exploiting known chaotic optoelectronic devices. The first one uses mutually coupled ECSL and extends typical chaos-based encryption strategies, such as chaos-shift keying (CSK) and chaos modulation (CMo). The second one uses an electro-optical oscillator (EOO) with multiple delayed feedback loops and aims first at transposing coded-division multiple access (CDMA) and then at developing novel strategies of encryption and decryption, when the time-delays of each feedback loop are time- dependent.
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Ketaki Animesh. "Multiplexing high speed quantum key distribution with conventional data on a single optical fibre." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708533.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Locquet, Alexandre Daniel. "Chaotic optical communications using delayed feedback systems." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10431.

Full text
Abstract:
Chaotic dynamics produced by optical delay systems have interesting applications in telecommunications. Optical chaos can be used to transmit secretly, in real-time, a message between an emitter and a receiver. The noise-like appearance of chaos is used to conceal the message, and the synchronization of the receiver with the chaotic emitter is used to decode the message. This work focuses on the study of two crucial topics in the field of chaotic optical communications. The first topic is the synchronization of chaotic external-cavity laser diodes, which are among the most promising chaotic emitters for secure communications. It is shown that, for edge-emitting lasers, two drastically different synchronization regimes are possible. The regimes differ in terms of the delay time in the synchronization and in terms of the robustness of the synchronization with respect to parameter mismatches between the emitter and the receiver. In vertical-cavity surface-emitting lasers, the two linearly-polarized components of the electric field also exhibit isochronous and anticipating synchronization when the coupling between the lasers is isotropic. When the coupling is polarized, the linearly-polarized component that is parallel to the injected polarization tends to synchronize isochronously with the injected optical field, while the other component tends to be suppressed, but it can also be antisynchronized. The second topic is the analysis of time series produced by optical chaotic emitters subjected to a delayed feedback. First, we verify with experimental data that chaos produced by optical delay systems is highly complex. This high complexity is demonstrated by estimating chaos dimension and entropy from experimental time series and from models of optical delay systems. Second, by analyzing chaotic time series, it is shown that the value of the delay of a single-delay system can always be identified, independently of the type of system used and of its complexity. Unfortunately, an eavesdropper can use this information on the delay value to break the cryptosystem. We propose a new cryptosystem with two delayed feedback loops that increases the difficulty of the delay identification problem.
APA, Harvard, Vancouver, ISO, and other styles
10

Vannier, Dos Santos Borges Carolina. "Bell inequalities with Orbital Angular Momentum of Light." Thesis, Paris 11, 2012. http://www.theses.fr/2012PA112225/document.

Full text
Abstract:
Dans une première partie introductive, nous rappelons la description théorique de la propagation de faisceaux optiques en terme des modes solutions de l'équation de propagation dans l'approximation paraxialle. Dans ce cadre, nous présentons les notions de moment cinétique transporté par les faisceaux lumineux, et de sa décomposition en moment cinétique intrinsèque (ou spin) et en moment angulaire.La seconde partie est consacrée au codage de l'information dans les degrés de libertés de polarisation et de modes transverses des faisceaux optiques. Les modes spin-orbites sont définis et un dispositif expérimental optique pour produire ces modes est présenté. Les modes spin-orbites sont alors exploités pour implémenter un protocole de distribution de clés BB84 ne nécessitant pas le partage à priori d'une base de référence.Dans une troisième partie, nous proposons un critère de type inégalité de Bell, qui constitue une condition suffisante pour caractériser la non-séparabilité en spin-orbite d'un faisceau optique classique. Nous montrons ensuite que la notion de modes spin-orbite séparable ou non-séparable constitue une analogie pertinente avec la notion d'intrication d'états quantiques et permet l'étude de certaines de ses propriétés fondamentales. Enfin, une implémentation expérimentale de cette simulation de tests de Bell avec des faisceaux optiques classiques est présentée, ainsi que sa description détaillée dans le cadre de l'optique quantique.Dans une dernière partie, nous nous intéressons à des inégalités de Bell, pour des états quantiques de systèmes quantiques à deux parties, qui sont caractérisées chacune par une variable continue de type angulaire (périodique). Nous montrons comment détecter la non-localité sur ce type de système, avec des inégalités qui sont similaires aux inégalités CHSH; inégalités qui avaient été développées originellement pour des systèmes de type spin 1/2. Nos inégalités, sont construites à partir de la mesure de la corrélation de fonctions angulaires. Nous montrons qu'elles sont en fait la superposition continue d'inégalités CHSH de type spin 1/2. Nous envisageons une possible implémentation expérimentale, où les corrélations mesurées sont les corrélations angulaires du profil transverse des photons intriqués<br>We shall present a theoretical description of paraxial beams, showing the propagation modes that arise from the solution of the paraxial equation in free space. We then discuss the angular momentum carried by light beams, with its decomposition in spin and orbital angular momentum and its quantization. We present the polarization and transverse modes of a beam as potential degrees of freedom to encode information. We define the Spin-Orbit modes and explain the experimental methods to produce such modes. We then apply the Spin-Orbit modes to perform a BB84 quantum key distribution protocol without a shared reference frame.We propose a Bell-like inequality criterion as a sufficient condition for the spin-orbit non-separability of a classical laser beam. We show that the notion of separable and non-separable spin-orbit modes in classical optics builds a useful analogy with entangled quantum states, allowing for the study of some of their important mathematical properties. We present a detailed quantum optical description of the experiment in which a comprehensive range of quantum states are considered.Following the study of Bell's inequalities we consider bipartite quantum systems characterized by a continuous angular variable θ. We show how to reveal non-locality on this type of system using inequalities similar to CHSH ones, originally derived for bipartite spin 1/2 like systems. Such inequalities involve correlated measurement of continuous angular functions and are equivalent to the continuous superposition of CHSH inequalities acting on two-dimensional subspaces of the infinite dimensional Hilbert space. As an example, we discuss in detail one application of our results, which consists in measuring orientation correlations on the transverse profile of entangled photons
APA, Harvard, Vancouver, ISO, and other styles
11

Trigo, Vidarte Luis. "Design and implementation of high-performance devices for continuous-variable quantum key distribution." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLO021.

Full text
Abstract:
La distribution quantique de clé (QKD) est une des premières technologies quantiques qui ait atteint un stade commercial, en proposant une solution au problème de la distribution d’une clé cryptographique entre deux entités, et en garantissant une sécurité à long terme. Elle est maintenant proche de la maturité technologique, et plusieurs méthodes sont disponibles en pratique. Cette thèse étudie la distribution quantique de clé à variables continues (CV-QKD), qui a plusieurs éléments communs avec les communications optiques cohérentes classiques, et qui pourrait permettre à beaucoup d’utilisateurs d’accéder à la QKD.L’utilisation de techniques de traitement numérique (Digital Signal Processor ou DSP), typiques en communications classiques, a été seulement partiellement exploitée dans les implémentations CV-QKD précédentes. Dans ce travail nous mettons en œuvre expérimentalement des techniques usuelles dans les communications classiques, comme la mise en forme d’impulsions, le filtrage adaptatif et la récupération de mode. Notre objectif est d’augmenter ainsi le taux de clé secrète, et d’optimiser l’utilisation de la bande passante disponible.La possibilité d'intégrer des composants dans un circuit photonique (PIC) est un autre avantage de CV-QKD. Nous avons testé un PIC en silicium intégrant un coupleur hybride 180º et deux photodiodes en germanium. Les paramètres mesurés sont compatibles avec la génération de clé secrète dans ces dispositifs.Un des facteurs les plus limitants de QKD est la chute des performances dans les canaux ayant des pertes très élevées, typiquement des fibres optiques dont la longueur dépasse la centaine de kilomètres. Mais la distance utile peut être étendue notablement en utilisant des liens en espace libre, en particulier avec des satellites, où les pertes à une certaine distance peuvent être inférieures à celles des fibres. Nous considérons un modèle pour le canal descendant et prédisons les taux de clé secrète attendus à différentes altitudes pour CV-QKD. Ces résultats aboutissent à une technologie potentiellement utilisable pour les communications par satellite, en étendant la portée jusqu’à des distances intercontinentales<br>Quantum key distribution (QKD) is one of the first quantum technologies that were able to provide commercially meaningful solutions to the problem of distributing cryptographic keys between trusted parties, guaranteeing long term security. It is now progressing towards technical maturity, by proposing multiple implementation alternatives. In this thesis, we study Continuous-Variables QKD (CV-QKD), which shares many common elements with classical coherent communication systems, and is a good candidate to facilitate the access to QKD for more users.The use of digital signal processing (DSP) techniques typical in classical communications has been only partially exploited in previous CV-QKD implementations. We experimentally implement standard telecommunication techniques like pulse shaping, adaptive filtering and mode recovery in order to improve the quantum secret key rate and optimize the occupied bandwidth.The potential of integration of the components in a photonic integrated circuit (PIC) is another important aspect of CV-QKD. We have tested a silicon photonics PIC integrating a 180º hybrid detector with two germanium photodiodes, showing that measured parameters are compatible with the generation of secret key.One of the most limiting factors of QKD is the performance under lossy channels, which is common in optical fibre for distances in the order of hundred kilometers. The range can be significantly extended using free space communications, and in particular satellites, where the losses at longer distances can be lower than those in fibre. We consider a model for a downlink satellite channel and predict the achievable secret key rates at different altitudes for CV-QKD, resulting in a potentially feasible technology for satellite communications, extending the range to intercontinental distances
APA, Harvard, Vancouver, ISO, and other styles
12

Durkoš, Michal. "Datová síť pro smart grid v energetice." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220116.

Full text
Abstract:
Electric grid as we now it has been without significant change for a long time. Along with the human population grows demand for electricity, which leads to need to create more energy. Bigger interest is in ecology and use of renewable sources, although these do not have constant output which often stresses the grid. These problems are to be solved by smart grids. Smart grids are capable of adjusting energy generation to immediate demand including renewable sources to compensate energy fluctuations in grid. They provide demand response and other applications interesting for end users. Smart grids are combination of achievements in energy, informatics and communication technology. Communication, which is key part of smart grids, has to met certain requirements and can be executed by various technologies. There are described various communication technologies and a design concept of data communication in this paper.
APA, Harvard, Vancouver, ISO, and other styles
13

Fossaluzza, Junior Luiz Antonio. "Criptografia ?ptica mediante controle anal?gico da amplitude e do atraso de fatias espectrais: an?lise para sinais NRZ e DQPSK." Pontif?cia Universidade Cat?lica de Campinas, 2012. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/528.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:31:33Z (GMT). No. of bitstreams: 1 Luiz Antonio Fossaluzza junior.pdf: 4580835 bytes, checksum: 4fdd68a1c6733e08c016db3e5dd34d0b (MD5) Previous issue date: 2012-11-23<br>This work investigates a technique to encrypt the optical signal for Transparent Optical Network, TON, in order to safeguard the confidentiality and guarantee the security of informations that are transmitted through the Telecommunications Network. The technique is assessed on the physical layer of the reference model for open systems interconnection, OSI, and consists of slicing spectrally optical signal and to apply various attenuations and delays to each of the slices spectral considered. These slices are multiplexed and the resulting signal, which will be propagated by an optical network transparent, it will be ideally unintelligible to eavesdropper who try to steals it. At this point is possible to evaluate the quality of the encryption used by measuring the output of the encoder the bit error rate, BER, the encrypted signal, BERC. In principle, as highest BERC,it will be lowest the probability of an eavesdropper decode the signal. To get to your destination, the signal is received in the decoder circuit, which has the same physical structure of the circuit which encoded the original signal. The application of the factors of attenuation and delay in this distorted signal is adjusted for the reconstruction of optical signal generated by the transmitter. On the output of decoder, performs the measurement of BER of signal decoded, the BERD. Ideally, BERD must be the lowest possible. For technique evaluation, it was simulated, with the version 8.7 of the software VPITransmissionMaker, of company VPIPhotonics Inc, the operation of the devices of cryptography, propagation and the elements of decoded signal. All simulations considered that the spectral slicing was carried out by means of filters with ideal profile. The results indicates that the BERC may reach up to 42% and 24%, to encrypted signals with modulation on-off Keying non return to zero (NRZ-OOK) and differential quadrature phase shift keying (DQPSK) respectively, and that both are free of errors (BERD< 10-15 for the signal NRZ-OOK and BERD< 10-6 for DQPSK modulation) when decoded.<br>Este trabalho aborda uma t?cnica para criptografar o sinal ?ptico em redes ?pticas transparentes (Transparent Optical Network, TON), de modo a salvaguardar o sigilo e garantir a seguran?a das informa??es que s?o transmitidas atrav?s da Rede de Telecomunica??es. A t?cnica avaliada ? relativa ? camada f?sica do modelo de refer?ncia para interconex?o de sistemas abertos (open systems interconnection, OSI) e consiste em dividir espectralmente um sinal ?ptico e em aplicar diferentes atenua??es e atrasos a cada uma das fatias espectrais consideradas. A seguir essas fatias s?o multiplexadas e o sinal resultante, que ser? propagado por uma rede ?ptica transparente, estar? idealmente inintelig?vel para intrusos que tentem furt?-lo. Nesse ponto ? poss?vel avaliar a qualidade da criptografia utilizada, medindo-se na sa?da do codificador a taxa de erro de bit (bit error rate, BER) do sinal criptografado, BERC. Em princ?pio, quanto maior BERC, menor a probabilidade de um intruso decodificar o sinal. Ao chegar ao seu destino, o sinal ? recebido no circuito decodificador, que possui a mesma estrutura f?sica do circuito que codificou o sinal original. A aplica??o dos fatores de atenua??o e atraso neste sinal distorcido ? ajustada para a reconstru??o do sinal ?ptico gerado pelo transmissor. Na sa?da do decodificador, efetua-se a medi??o da BER do sinal decodificado, BERD. Idealmente, BERD deve ser a menor poss?vel. Para avalia??o da t?cnica, simulou-se, com a vers?o 8.7 do software VPITransmissionMaker, da empresa VPIPhotonics Inc, a opera??o dos dispositivos de criptografia, da propaga??o e dos elementos de decriptografia do sinal. Todas as simula??es consideraram que o fatiamento espectral foi realizado por meio de filtros com perfil ideal. Os resultados indicam que a BERC pode atingir at? 42% e 24%, para sinais codificados com modula??o n?o retorno ao zero com chaveamento on-off (non return to zero on-off keying, NRZ-OOK) e por deslocamento de fase diferencial em quadratura (differential quadrature phase shift keying, DQPSK) respectivamente, e que ambos n?o apresentam erros (BERD< 10-15 para o sinal NRZ-OOK e BERD< 10-6 para a modula??o DQPSK) quando decodificados.
APA, Harvard, Vancouver, ISO, and other styles
14

Martins, Claudinei. "Avalia??o de dispositivos de fot?nica de sil?cio para o projeto de filtros ?pticos de banda estreita." Pontif?cia Universidade Cat?lica de Campinas, 2015. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/554.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:31:43Z (GMT). No. of bitstreams: 1 CLAUDINEI MARTINS.pdf: 2135890 bytes, checksum: 419e34d778fa576dcea52630975b8c78 (MD5) Previous issue date: 2015-06-30<br>Pontif?cia Universidade Cat?lica de Campinas<br>The intensive use of high-density data applications has driven the relentless pursuit of networks capable to provide high traffic capacity. The transparent optical networks plays an important role in the telecommunications infrastructure core, being able to meet these demands. New technologies to terabits per second networks have created a new stage of development for optical communications. New optical components that allows signal process in addition to just transportation, are needed. The scope of these networks extends from the core of the infrastructure to the end user, reaching the last mile, and recently also end devices such as computers, televisions and Internet. In this context, Silicon Photonics gained momentum in the last decade, as an alternative to the need to take the processing of optical signals to levels similar to those already made by semiconductor technology, in processing electrical signals. In our work, we studied systematically using simulations, ring resonators structure in Silicon Photonics, as technology to build miniaturized devices capable of handling optical signals. In particular, we investigated optical band-pass filter design narrowed than such filters used to the separation channel in wavelength division multiplexing systems, for application in various areas of optical networks such as radio over fiber, multiplexers, all optical encoders and modulators. In this work uses ring resonators structure for construction of these high order filters with reduced size, with a substrate of some micrometers area. Such filters could be built into microchips and integrated with other optical and optical-electronic components, resulting in more complex systems, in the near future. The main result was an optical band-pass filter with 8.6 GHz bandwidth based on asymmetric ring resonators with two sets of three rings, with following radii 5 ?m, 2.5 ?m and 5 ?m using a substrate area of 1840 ?m2 or, 57 ?m x 120 ?m.<br>O uso intensivo de aplica??es de alta densidade de dados tem impulsionado a busca constante por redes capazes de prover elevada capacidade de tr?fego. As redes ?pticas transparentes s?o capazes de atender a estas demandas e cumprem um papel relevante no n?cleo da infraestrutura de telecomunica??es. As novas tecnologias para redes de terabits por segundo criaram uma nova etapa do desenvolvimento das comunica??es ?pticas e novos componentes com capacidade n?o s? de transporte, mas tamb?m de processamento do sinal ?ptico tornaram-se necess?rios. A abrang?ncia destas redes estende-se do n?cleo da infraestrutura at? o usu?rio final, chegando ? ?ltima milha e, mais recentemente, tamb?m aos dispositivos finais, tais como computadores, televisores e Internet. Neste contexto, a Fot?nica de Sil?cio ganhou impulso, na ?ltima d?cada, como uma alternativa ? necessidade de levar o processamento dos sinais ?pticos a n?veis semelhantes aos j? realizados pela tecnologia de semicondutores no processamento de sinais el?tricos. Em nosso trabalho, pesquisamos de forma sistem?tica, utilizando simula??es, para o projeto de filtros com an?is ressoantes, constru?dos em Fot?nica de Sil?cio, para desenvolvimento de dispositivos miniaturizados capazes de tratar sinais ?pticos. Em particular, investigou-se o projeto de filtros ?pticos passa-faixa, de banda inferior ? utilizada, para separa??o de canais em sistemas de multiplexa??o por divis?o de comprimento de onda, para aplica??o em diversas ?reas das redes ?pticas, tais como r?dio sobre fibra, multiplexadores, moduladores e codificadores totalmente ?pticos. Neste trabalho, utiliza-se estrutura de an?is ressonantes para constru??o destes filtros, de ordem elevada e de tamanho reduzido, em um substrato de alguns micr?metros de ?rea. Tais filtros poder?o ser constru?dos em microchips e integrados com outros componentes ?pticos e ?ptico-eletr?nicos, dando origem a sistemas mais complexos no futuro pr?ximo. O principal resultado obtido foi um filtro ?ptico passa banda com 8,6 GHz de largura de banda, baseado em an?is ressoantes assim?tricos, composto de duas estruturas de tr?s an?is de raios 5 ?m, 2,5 ?m e 5 ?m, utilizando uma ?rea de substrato de 6840 ?m2 ou 57 ?m x 120 ?m.
APA, Harvard, Vancouver, ISO, and other styles
15

Vannier, dos santos borges Carolina. "Bell inequalities with Orbital Angular Momentum of Light." Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00767216.

Full text
Abstract:
We shall present a theoretical description of paraxial beams, showing the propagation modes that arise from the solution of the paraxial equation in free space. We then discuss the angular momentum carried by light beams, with its decomposition in spin and orbital angular momentum and its quantization. We present the polarization and transverse modes of a beam as potential degrees of freedom to encode information. We define the Spin-Orbit modes and explain the experimental methods to produce such modes. We then apply the Spin-Orbit modes to perform a BB84 quantum key distribution protocol without a shared reference frame.We propose a Bell-like inequality criterion as a sufficient condition for the spin-orbit non-separability of a classical laser beam. We show that the notion of separable and non-separable spin-orbit modes in classical optics builds a useful analogy with entangled quantum states, allowing for the study of some of their important mathematical properties. We present a detailed quantum optical description of the experiment in which a comprehensive range of quantum states are considered.Following the study of Bell's inequalities we consider bipartite quantum systems characterized by a continuous angular variable θ. We show how to reveal non-locality on this type of system using inequalities similar to CHSH ones, originally derived for bipartite spin 1/2 like systems. Such inequalities involve correlated measurement of continuous angular functions and are equivalent to the continuous superposition of CHSH inequalities acting on two-dimensional subspaces of the infinite dimensional Hilbert space. As an example, we discuss in detail one application of our results, which consists in measuring orientation correlations on the transverse profile of entangled photons.
APA, Harvard, Vancouver, ISO, and other styles
16

Sit, Alicia. "Quantum Communication: Through the Elements: Earth, Air, Water." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39648.

Full text
Abstract:
This thesis encompasses a body of experimental work on the use of structured light in quantum cryptographic protocols. In particular, we investigate the ability to perform quantum key distribution through various quantum channels (fibre, free-space, underwater) in laboratory and realistic conditions. We first demonstrate that a special type of optical fibre (vortex fibre) capable of coherently transmitting vector vortex modes is a viable quantum channel. Next, we describe the first demonstration of high-dimensional quantum cryptography using structured photons in an urban setting. In particular, the prevalence of atmospheric turbulence can introduce many errors to a transmitted key; however, we are still able to transmit more information per carrier using a 4-dimensional scheme in comparison to a 2-dimensional one. Lastly, we investigate the possibility of performing secure quantum communication with twisted photons in an uncontrolled underwater channel. We find that though it is possible for low-dimensional schemes, high-dimensional schemes suffer from underwater turbulence without the use of corrective wavefront techniques.
APA, Harvard, Vancouver, ISO, and other styles
17

Curty, Alonso Marcos. "Cryptographic protocols in optical communication." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=979048621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Rödiger, Jasper. "Time-Frequency Quantum Key Distribution: Numerical Assessment and Implementation over a Free-Space Link." Doctoral thesis, Humboldt-Universität zu Berlin, 2020. http://dx.doi.org/10.18452/21046.

Full text
Abstract:
Die Quantenschlüsselverteilung (QKD), die erste anwendbare Quantentechnologie, verspricht informationstheoretisch sichere Kommunikation. In der vorliegenden Arbeit wurde das Zeit-Frequenz (TF)-QKD-Protokoll untersucht, das Zeit und Frequenz, nämlich Puls-Positionsmodulation (PPM) im Zeitbereich und Frequenzumtastung (FSK) im Frequenzbereich als die beiden komplementären Basen verwendet. Seine Sicherheit beruht den Quanteneigenschaften von Licht und auf der Zeit-Frequenz-Unschärferelation. TF-QKD kann mit größtenteils Standard-Telekommunikationstechnologie im 1550-nm-Band implementiert werden. Die PPM-Basis kann mit Modulatoren und die FSK-Basis mit Hilfe der Wellenlängenmultiplex-Technologie realisiert werden. Das TF-QKD-Protokoll ist in der Lage, ein beliebig großes Alphabet bereitzustellen, was mehr als 1 bit/Photon ermöglicht. Darüber hinaus ist es robust gegenüber athmosphärischen Störungen und somit für die Übertragung über den Freiraumkanal geeignet. In der vorliegenden Arbeit wird das TF-QKD-Protokoll theoretisch bewertet, mit Standardkomponenten für 1 bit/Photon implementiert und die Freiraumübertragung mit optischem Tracking über eine 388 m Teststrecke wird bei Tageslicht demonstriert. Unter Verwendung der vorhandenen Komponenten konnte eine sichere Schlüsselrate von 364 kbit/s back-to-back und 9 kbit/s über den Freiraumkanal demonstriert werden.<br>Quantum key distribution (QKD), the first applicable quantum technology, promises information theoretically secure communication. In the presented work the time-frequency (TF)-QKD protocol was examined, which uses time and frequency, namely pulse position modulation (PPM) in the time domain and frequency shift keying (FSK) in the frequency domain as the two complementary bases. Its security relies on the quantum properties of light and the time-frequency uncertainty relation. TF-QKD can be implemented mostly with standard telecom-technology in the 1550 nm band. The PPM basis can be implemented with modulators and the FSK basis with help of wavelength-division multiplexing technology. The TF-QKD protocol is capable of providing an arbitrarily large alphabet enabling more than 1 bit/photon. Moreover, it is robust in the atmosphere making it suitable for transmission over the free-space channel. In the present work the TF-QKD protocol is assessed theoretically, implemented with off-the-shelf components for 1 bit/photon and free-space transmission with optical tracking over a 388 m testbed is demonstrated in daylight. Using components at hand, secret key rates of 364 kbit/s back-to-back and 9 kbit/s over the free-space channel could be demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
19

Bailey, Daniel V. "Computation in optimal extension fields." Link to electronic version, 2000. http://www.wpi.edu/Pubs/ETD/Available/etd-0428100-133037/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ghammam, Loubna. "Utilisation des couplages en cryptographie asymétrique pour la micro-électronique." Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S081/document.

Full text
Abstract:
Les couplages sont des outils mathématiques introduits par André Weil en 1948. Ils sont un sujet très en vogue depuis une dizaine d'années en cryptographie asymétrique. Ils permettent en effet de réaliser des opérations cryptographiques impossible à réaliser simplement autrement tel que la signature courte et la cryptographie basée sur l'identité. Ces dernières années, le calcul des couplages est devenu plus facile grâce à l'introduction de nouvelles méthodes de calculs mathématiques particulièrement efficaces sur les courbes elliptiques dites les courbes bien adaptées aux couplages. Aujourd'hui, nous sommes au stade de transfert de cette technologie, de la théorie vers la mise en œuvre pratique, sur des composants électroniques. Ce transfert soulève de nombreuses problématiques qui s'avèrent difficile à surmonter à cause de la différence de culture scientifique entre mathématiciens et micro-électroniciens. Dans le présent document, en premier lieu, nous avons étudié le problème de l'implémentation du couplage dans des environnements restreints. En effet, le calcul du couplage de Tate, ou aussi de l'une de ses variantes, nécessite plusieurs variables pour être implémenté, par conséquent, il nécessite une bonne partie de la mémoire du composant électronique sur lequel nous souhaitons implémenter un tel couplage.Dans ce contexte, en faisant des optimisations mathématiques, nous avons pu implémenté ces couplages dans des environnements retreints. Le deuxième problème que nous avons traité dans cette thèse est celui de la sécurité des protocoles cryptographiques basés sur les couplages. Dans ce contexte, puisque les couplages sur les courbes elliptiques sont censés d'être matériellement attaqués, nous devons le protéger contre ces attaques. Nous avons étudié les attaques sur les couplages et nous avons proposé une contre-mesure<br>Les couplages sont des outils mathématiques introduits par André Weil en 1948. Ils sont un sujet très en vogue depuis une dizaine d'années en cryptographie asymétrique. Ils permettent en effet de réaliser des opérations cryptographiques impossible à réaliser simplement autrement tel que la signature courte et la cryptographie basée sur l'identité. Ces dernières années, le calcul des couplages est devenu plus facile grâce à l'introduction de nouvelles méthodes de calculs mathématiques particulièrement efficaces sur les courbes elliptiques dites les courbes bien adaptées aux couplages. Aujourd'hui, nous sommes au stade de transfert de cette technologie, de la théorie vers la mise en œuvre pratique, sur des composants électroniques. Ce transfert soulève de nombreuses problématiques qui s'avèrent difficile à surmonter à cause de la différence de culture scientifique entre mathématiciens et micro-électroniciens. Dans le présent document, en premier lieu, nous avons étudié le problème de l'implémentation du couplage dans des environnements restreints. En effet, le calcul du couplage de Tate, ou aussi de l'une de ses variantes, nécessite plusieurs variables pour être implémenté, par conséquent, il nécessite une bonne partie de la mémoire du composant électronique sur lequel nous souhaitons implémenter un tel couplage.Dans ce contexte, en faisant des optimisations mathématiques, nous avons pu implémenté ces couplages dans des environnements retreints. Le deuxième problème que nous avons traité dans cette thèse est celui de la sécurité des protocoles cryptographiques basés sur les couplages. Dans ce contexte, puisque les couplages sur les courbes elliptiques sont censés d'être matériellement attaqués, nous devons le protéger contre ces attaques. Nous avons étudié les attaques sur les couplages et nous avons proposé une contre-mesure
APA, Harvard, Vancouver, ISO, and other styles
21

Makarov, Vadim. "Quantum cryptography and quantum cryptanalysis." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1473.

Full text
Abstract:
<p>This doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 through 2007.</p><p>The opening parts contain a brief introduction into quantum cryptography as well as an overview of all existing single photon detection techniques for visible and near infrared light. Then, our implementation of a fiber optic quantum key distribution (QKD) system is described. We employ a one-way phase coding scheme with a 1310 nm attenuated laser source and a polarization-maintaining Mach-Zehnder interferometer. A feature of our scheme is that it tracks phase drift in the interferometer at the single photon level instead of employing hardware phase control measures. An optimal phase tracking algorithm has been developed, implemented and tested. Phase tracking accuracy of +-10 degrees is achieved when approximately 200 photon counts are collected in each cycle of adjustment. Another feature of our QKD system is that it uses a single photon detector based on a germanium avalanche photodiode gated at 20 MHz. To make possible this relatively high gating rate, we have developed, implemented and tested an afterpulse blocking technique, when a number of gating pulses is blocked after each registered avalanche. This technique allows to increase the key generation rate nearly proportionally to the increase of the gating rate. QKD has been demonstrated in the laboratory setting with only a very limited success: by the time of the thesis completion we had malfunctioning components in the setup, and the quantum bit error rate remained unstable with its lowest registered value of about 4%.</p><p>More than half of the thesis is devoted to various security aspects of QKD. We have studied several attacks that exploit component imperfections and loopholes in optical schemes. In a large pulse attack, settings of modulators inside Alice's and Bob's setups are read out by external interrogating light pulses, without interacting with quantum states and without raising security alarms. An external measurement of phase shift at Alice's phase modulator in our setup has been demonstrated experimentally. In a faked states attack, Eve intercepts Alice's qubits and then utilizes various optical imperfections in Bob's scheme to construct and resend light pulses in such a way that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Construction of such faked states using several different imperfections is discussed. Also, we sketch a practical workflow of breaking into a running quantum cryptolink for the two abovementioned classes of attacks. A special attention is paid to a common imperfection when sensitivity of Bob's two detectors relative to one another can be controlled by Eve via an external parameter, for example via the timing of the incoming pulse. This imperfection is illustrated by measurements on two different single photon detectors. Quantitative results for a faked states attack on the Bennett-Brassard 1984 (BB84) and the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocols using this imperfection are obtained. It is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols. Furthermore we have attempted to integrate this imperfection of detectors into the general security proof for the BB84 protocol. For all attacks, their applicability to and implications for various known QKD schemes are considered, and countermeasures against the attacks are proposed.</p><p>The thesis incorporates published papers [J. Mod. Opt. 48, 2023 (2001)], [Appl. Opt. 43, 4385 (2004)], [J. Mod. Opt. 52, 691 (2005)], [Phys. Rev. A 74, 022313 (2006)], and [quant-ph/0702262].</p>
APA, Harvard, Vancouver, ISO, and other styles
22

Xu, Qing. "Détection Optique Homodyne: application à la cryptographie quantique." Phd thesis, Télécom ParisTech, 2009. http://pastel.archives-ouvertes.fr/pastel-00005580.

Full text
Abstract:
Les réseaux et systèmes de télécommunications mondiaux fondent aujourd'hui leur confidentialité sur la cryptographie classique, qui repose sur des hypothèses mathématiques fragiles. La distribution quantique de clef (QKD) est aujourd'hui la seule façon connue pour distribuer des clefs avec une sécurité inconditionnelle. Ce travail de thèse contribue à combler de manière pluridisciplinaire et polyvalente le gap entre les limites physiques fondamentales et l'implémentation expérimentale, en termes de vitesse, fiabilité et robustesse. Dans un premier temps, nous avons donc proposé une implémentation du protocole BB84 utilisant les états de phase cohérents. Le récepteur homodyne a été conçu de manière à compenser les fluctuations de phase et de polarisation dans les interféromètres, ainsi que dans le reste du canal de propagation. Ensuite, nous avons mis en place un dispositif expérimental de système QKD à la longueur d'onde 1550 nm, avec une modulation QPSK fonctionnant avec un trajet et un sens de parcours uniques, dans une fibre optique mono-mode. Les deux schémas de détection: le comptage de photons (PC) et la détection homodyne équilibrée (BHD) ont été mis en œuvre. Enfin, nous avons effectué des comparaisons théoriques et expérimentales de ces deux récepteurs. Le récepteur BHD a été élaboré avec une décision à double seuil. La mise en œuvre d'un tel processus accepte des mesures non-conclusives, et réduit l'efficacité de génération des clés, mais reste encore bien meilleur que celle des PCs à 1550 nm. Nous avons également prouvé que ce système est robust sous la plupart des attaques potentielles.
APA, Harvard, Vancouver, ISO, and other styles
23

Bolduc, Eliot. "Studies in Applied and Fundamental Quantum Mechanics: Duality, Tomography, Cryptography and Holography." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/26291.

Full text
Abstract:
This thesis encompasses a collection of four pieces of work on wave-particle duality, weak-value-assisted tomography, high-dimensional quantum key distribution, and phase-only holograms. In the work on duality, we derive a novel duality relation, and we sketch a thought experiment that leads to an apparent violation of the duality principle. In the project on tomography, we perform a state determination procedure with weak values, and we study the accuracy of the method. In the quantum cryptography project, we optimize an experimental implementation of a quantum cryptography system where two parties share information with the orbital angular momentum degree of freedom of entangled photon pairs. Finally, in the work on holography, we establish the exact solution to the encryption of a phase-only hologram, and experimentally demonstrate its application to spatial light modulators. The four projects provide improvements on measurement procedures in applied and fundamental quantum mechanics.
APA, Harvard, Vancouver, ISO, and other styles
24

Bozzio, Mathieu. "Security and implementation of advanced quantum cryptography : quantum money and quantum weak coin flipping." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT045.

Full text
Abstract:
Les lois de la mécanique quantique présentent un fort potentiel d’amélioration pour la sécurité des réseaux de communication, du cryptage à clé publique au vote électronique, en passant par la banque en ligne. Cette thèse porte sur la sécurité pratique et l’implémentation de deux tâches cryptographiques quantiques : la monnaie quantique et le tirage à pile-ou-face faible. La monnaie quantique exploite le théorème de non-clonage quantique pour générer des jetons, billets ou cartes de crédit strictement infalsifiables. Nous réalisons la première démonstration expérimentale de cette fonctionnalité sur une plateforme photonique aux longueurs d’onde télécom. Nous développons ensuite une analyse de sécurité pratique pour les cartes de crédit quantique. La banque peut ainsi vérifier l’authenticité de la carte à distance, même en présence d’un terminal de paiement malhonnête. Enfin, nous proposons une expérience permettant le stockage sécurisé d’une carte de crédit quantique en utilisant la transparence électromagnétiquement induite au sein d’un nuage d’atomes refroidis. Le tirage à pile-ou-face faible est une primitive cryptographique fondamentale: elle permet en effet la construction de tâches plus complexes telles que la mise en gage de bit et le calcul multipartite sécurisé. Lors d’un tirage à pile ou face, deux entités distantes et méfiantes jettent une pièce. Grâce à l’intrication quantique, il est possible de limiter la probabilité que l’entité malhonnête biaise la pièce. Dans ce projet, nous proposons la première implémentation du pile-ou-face faible. Celle-ci requiert un photon unique et une plateforme d’optique linéaire. Nous présentons l’analyse de sécurité en présence d’erreurs et de pertes, et démontrons que le protocole est réalisable à l’échelle d’une ville. Enfin, nous proposons de réduire davantage la probabilité du biais du protocole<br>Harnessing the laws of quantum theory can drastically boost the security of modern communication networks, from public key encryption to electronic voting and online banking. In this thesis, we bridge the gap between theory and experiment regarding two quantum-cryptographic tasks: quantum money and quantum weak coin flipping. Quantum money exploits the no-cloning property of quantum physics to generate unforgeable tokens, banknotes, and credit cards. We provide the first proof-of-principle implementation of this task, using photonic systems at telecom wavelengths. We then develop a practical security proof for quantum credit card schemes, in which the bank can remotely verify a card even in the presence of a malicious payment terminal. We finally propose a setup for secure quantum storage of the credit card, using electromagnetically-induced transparency in a cloud of cold cesium atoms. Quantum weak coin flipping is a fundamental cryptographic primitive, which helps construct more complex tasks such as bit commitment and multiparty computation. It allows two distant parties to flip a coin when they both desire opposite outcomes. Using quantum entanglement then prevents any party from biasing the outcome of the flip beyond a certain probability. We propose the first implementation for quantum weak coin flipping, which requires a single photon and linear optics only. We provide the complete security analysis in the presence of noise and losses, and show that the protocol is implementable on the scale of a small city with current technology. We finally propose a linear-optical extension of the protocol to lower the coin bias
APA, Harvard, Vancouver, ISO, and other styles
25

Baktir, Selcuk. "Efficient algorithms for finite fields, with applications in elliptic curve cryptography." Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-132249.

Full text
Abstract:
Thesis (M.S.)--Worcester Polytechnic Institute.<br>Keywords: multiplication; OTF; optimal extension fields; finite fields; optimal tower fields; cryptography; OEF; inversion; finite field arithmetic; elliptic curve cryptography. Includes bibliographical references (p. 50-52).
APA, Harvard, Vancouver, ISO, and other styles
26

Jogenfors, Jonathan. "Breaking the Unbreakable : Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography." Doctoral thesis, Linköpings universitet, Informationskodning, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-140912.

Full text
Abstract:
In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distribution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eavesdroppers. We study several relevant loopholes and show how they can be used to break the security of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quantum key distribution is in part based on the profound no-cloning theorem, which prevents physical states to be copied at a microscopic level. This important property of quantum mechanics can be seen as Nature's own copy-protection, and can also be used to create a currency based on quantummechanics, i.e., quantum money. Here, the traditional copy-protection mechanisms of traditional coins and banknotes can be abandoned in favor of the laws of quantum physics. Previously, quantum money assumes a traditional hierarchy where a central, trusted bank controls the economy. We show how quantum money together with a blockchain allows for Quantum Bitcoin, a novel hybrid currency that promises fast transactions, extensive scalability, and full anonymity.<br>En viktig konsekvens av kvantmekaniken är att okända kvanttillstånd inte kan klonas. Denna insikt har gett upphov till kvantkryptering, en metod för två parter att med perfekt säkerhet kommunicera hemligheter. Ett komplett bevis för denna säkerhet har dock låtit vänta på sig eftersom en attackerare i hemlighet kan manipulera utrustningen så att den läcker information. Som ett svar på detta utvecklades apparatsoberoende kvantkryptering som i teorin är immun mot sådana attacker. Apparatsoberoende kvantkryptering har en mycket högre grad av säkerhet än vanlig kvantkryptering, men det finns fortfarande ett par luckor som en attackerare kan utnyttja. Dessa kryphål har tidigare inte tagits på allvar, men denna avhandling visar hur även små svagheter i säkerhetsmodellen läcker information till en attackerare. Vi demonstrerar en praktisk attack där attackeraren aldrig upptäcks trots att denne helt kontrollerar systemet. Vi visar också hur kryphålen kan förhindras med starkare säkerhetsbevis. En annan tillämpning av kvantmekanikens förbud mot kloning är pengar som använder detta naturens egna kopieringsskydd. Dessa kvantpengar har helt andra egenskaper än vanliga mynt, sedlar eller digitala banköverföringar. Vi visar hur man kan kombinera kvantpengar med en blockkedja, och man får då man en slags "kvant-Bitcoin". Detta nya betalningsmedel har fördelar över alla andra betalsystem, men nackdelen är att det krävs en kvantdator.
APA, Harvard, Vancouver, ISO, and other styles
27

Kale, Zuhal. "Low Temperature Operation Of Apd For Quantum Cryptographic Applications." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606113/index.pdf.

Full text
Abstract:
This thesis explains low temperature operation of an InGaAs Avalanche Photo Diode (APD) cooled using thermoelectric coolers in order to utilize in the quantum cryptographic applications. A theoretical background for the equipment used in the experiment was provided. Circuitry and mechanics used for the low temperature operation were designed. Performance measures for APD were explained and experiment results were presented.
APA, Harvard, Vancouver, ISO, and other styles
28

Aktas, Djeylan. "Photonique quantique expérimentale : cohérence, non localité et cryptographie." Thesis, Université Côte d'Azur (ComUE), 2016. http://www.theses.fr/2016AZUR4142.

Full text
Abstract:
Cette thèse s'articule autour de l'étude de la cohérence de la lumière produite à partir de sources de paires de photons intriqués et de micro-lasers. Nous avons produit et manipulé des états photoniques intriqués, et conduit des investigations à la fois fondamentales et appliquées. Les deux études menées sur les aspects fondamentaux de la non localité avaient pour but de relaxer partiellement deux contraintes sur lesquelles s'appuie l'inégalité de Bell standard en vue d'applications à la cryptographie quantique. Ainsi, en collaboration avec l'Université de Genève, nous avons redéfini la notion de localité en prenant en compte les influences sur les mesures de corrélations des choix des configurations expérimentales et d'une efficacité globale de détection limitée. Cela a permis de définir des inégalités de Bell généralisées et les violations expérimentales qui en découlent permettent d'attester de la non localité des états quantiques observés. Nous avons aussi étudié et mis en place une solution expérimentale autorisant l'émission de photons intriqués dans des pairs de canaux télécoms pour la cryptographie quantique. Nous avons montré la préservation de l'intrication sur 150 km et obtenu des débits records en comparaison avec les réalisations similaires. Enfin, nous avons étudié les propriétés de l’émission de lasers à semi-conducteurs aux dimensions réduites. L’émission de ces composants microscopiques s'accompagne de grandes fluctuations en intensité lorsque ceux-ci sont pompés en-dessous du seuil laser. Cette étude a permis de mieux comprendre comment se construit la cohérence laser dans ces systèmes<br>In this thesis we study the coherence of light emitted by entangled photon-pair sources and micro-lasers. We have generated an manipulated entangled photonic states and investigated both fundamental (non locality) and applied (quantum cryptography) research directions. The objective of two fundamental studies on non locality was to partially relax the strong assumptions on which standard Bell tests rely. To this end, we redefined, in collaboration with the University of Geneva, the formalism of locality taking into account the influence, on correlation measurements, of the freedom of choice (in the basis settings) and of the limitation of the overall detection efficiency. Both assumptions allow devising generalized Bell inequalities whose experimental violations indicate that we can still attest for non locality for the observed states. In addition, we have studied and realized an experimental setup allowing to distribute entangled photon pairs in paired telecom channels for high bit rate quantum cryptography. We have shown that entanglement is preserved over a distance of 150 km with record rates for similar realizations, by mimicking classical network solutions exploiting, in an optimal fashion, the capacity of an optical fiber link via dense spectral multiplexing. Finally, we have studied the properties of light emitted by semiconductor lasers showing reduced dimensionality. This micro-lasers actually provide output light under high intensity fluctuations when they are pumped below the threshold. Their study allowed to refine our understanding on how the coherence builds up in these systems as the cavity is filled with photons
APA, Harvard, Vancouver, ISO, and other styles
29

Chailloux, André. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Thesis, Paris 11, 2011. http://www.theses.fr/2011PA112121/document.

Full text
Abstract:
L'avènement de l'informatique quantique permet de réétudier les primitives cryptographiques avec une sécurité inconditionnelle, c'est à dire sécurisé même contre des adversaires tout puissants. En 1984, Bennett et Brassard ont construit un protocole quantique de distribution de clé. Dans ce protocole, deux joueurs Alice et Bob coopèrent pour partager une clé secrète inconnue d'une tierce personne Eve. Ce protocole a une sécurité inconditionnelle et n'a pasd'équivalent classique.Dans ma thèse, j'ai étudié les primitives cryptographiques à deux joueurs où ces joueurs ne se font pas confiance. J'étudie principalement le pile ou face quantique et la mise-en-gage quantique de bit. En informatique classique, ces primitivessont réalisables uniquement avec des hypothèses calculatoires, c'est-à-dire en supposant la difficulté d'un problème donné. Des protocoles quantiques ont été construits pour ces primitives où un adversaire peut tricher avec une probabilité constante strictement inférieure à 1, ce qui reste impossible classiquement. Néanmoins, Lo et Chau ont montré l'impossibilité de créer ces primitives parfaitement même en utilisant l'informatique quantique. Il reste donc à déterminer quelles sont les limites physiques de ces primitives.Dans une première partie, je construis un protocole quantique de pile ou face où chaque joueur peut tricher avec probabilité au plus 1/racine(2) + eps pour tout eps &gt; 0. Ce résultat complète un résultat de Kitaev qui dit que dans un jeu de pile ou face quantique, un joueur peut toujours tricher avec probabilité au moins 1/racine(2). J'ai également construit un protocole de mise-en-gage de bit quantique optimal où un joueur peut tricher avec probabilité au plus 0,739 + eps pour tout eps &gt; 0 puis ai montré que ce protocole est en fait optimal. Finalement, j'ai dérivé des bornes inférieures et supérieures pour une autre primitive: la transmission inconsciente, qui est une primitive universelle.Dans une deuxième partie, j'intègre certains aspects pratiques dans ces protocoles. Parfois les appareils de mesure ne donnent aucun résultat, ce sont les pertes dans la mesure. Je construis un protocole de lancer de pièce quantique tolérant aux pertes avec une probabilité de tricher de 0,859. Ensuite, j'étudie le modèle dispositif-indépendant où on ne suppose plus rien sur les appareils de mesure et de création d'état quantique.Finalement, dans une troisième partie, j'étudie ces primitives cryptographiques avec un sécurité computationnelle. En particulier, je fais le lien entre la mise en gage de bit quantique et les protocoles zero-knowledge quantiques<br>Quantum computing allows us to revisit the study of quantum cryptographic primitives with information theoretic security. In 1984, Bennett and Brassard presented a protocol of quantum key distribution. In this protocol, Alice and Bob cooperate in order to share a common secret key k, which has to be unknown for a third party that has access to the communication channel. They showed how to perform this task quantumly with an information theoretic security; which is impossible classically.In my thesis, I study cryptographic primitives with two players that do not trust each other. I study mainly coin flipping and bit commitment. Classically, both these primitives are impossible classically with information theoretic security. Quantum protocols for these primitives where constructed where cheating players could cheat with probability stricly smaller than 1. However, Lo, Chau and Mayers showed that these primitives are impossible to achieve perfectly even quantumly if one requires information theoretic security. I study to what extent imperfect protocols can be done in this setting.In the first part, I construct a quantum coin flipping protocol with cheating probabitlity of 1/root(2) + eps for any eps &gt; 0. This completes a result by Kitaev who showed that in any quantum coin flipping protocol, one of the players can cheat with probability at least 1/root(2). I also constructed a quantum bit commitment protocol with cheating probability 0.739 + eps for any eps &gt; 0 and showed that this protocol is essentially optimal. I also derived some upper and lower bounds for quantum oblivious transfer, which is a universal cryptographic primitive.In the second part, I study some practical aspects related to these primitives. I take into account losses than can occur when measuring a quantum state. I construct a Quantum Coin Flipping and Quantum Bit Commitment protocols which are loss-tolerant and have cheating probabilities of 0.859. I also construct these primitives in the device independent model, where the players do not trust their quantum device. Finally, in the third part, I study these cryptographic primitives with information theoretic security. More precisely, I study the relationship between computational quantum bit commitment and quantum zero-knowledge protocols
APA, Harvard, Vancouver, ISO, and other styles
30

Sabóia, Karlo David Alves. "Estudo do desempenho de filtros acústicos-ópticos sintonizáveis como componentes biestáveis e sua utilização na criptografia em redes ópticas." reponame:Repositório Institucional da UFC, 2009. http://www.repositorio.ufc.br/handle/riufc/13670.

Full text
Abstract:
SABÓIA, Karlo David Alves. Estudo do desempenho de filtros acústicos-ópticos sintonizáveis como componentes biestáveis e sua utilização na criptografia em redes ópticas. 2009. 138 f. Tese (Doutorado em Física) - Programa de Pós-Graduação em Física, Departamento de Física, Centro de Ciências, Universidade Federal do Ceará, Fortaleza, 2009.<br>Submitted by Edvander Pires (edvanderpires@gmail.com) on 2015-10-15T17:52:52Z No. of bitstreams: 1 2009_tese_kdasaboia.pdf: 1920593 bytes, checksum: 4fd70f8b99a1d192f94bef6debcb1a7a (MD5)<br>Approved for entry into archive by Edvander Pires(edvanderpires@gmail.com) on 2015-10-21T20:34:18Z (GMT) No. of bitstreams: 1 2009_tese_kdasaboia.pdf: 1920593 bytes, checksum: 4fd70f8b99a1d192f94bef6debcb1a7a (MD5)<br>Made available in DSpace on 2015-10-21T20:34:18Z (GMT). No. of bitstreams: 1 2009_tese_kdasaboia.pdf: 1920593 bytes, checksum: 4fd70f8b99a1d192f94bef6debcb1a7a (MD5) Previous issue date: 2009<br>The performance of acoustic-optic tunable filters (AOTF) as a bistable component, applied to cryptography in optical networks, has been studied with analytical and numerical methods. Initial investigations of such filters highlighted their main transmissions, and analyzed their behavior by nonlinear effects with formation of optical bistability when a feedback was introduced in the system. Subsequently, it was proposed the use of an AOTF device, together with simultaneous modulation of ultrashort pulses by position (PPM) and amplitude (PAM), for generation of a cryptographic system for application in optical networks. Numerical simulations were performed using the Runge-Kutta fourth order method. The results for the study of bistability showed the dependence of the hysteresis curve with respect to the product of coupling constant by the length of the device and the conversion power-coupling constant factor (G). It was shown that the range of bistability varies significantly with both G and the product of coupling constant by the length of the device. The variation of the product of coupling constant by the length of the device directly increases the size of the bistability range while the increase in G causes the bistability occurrence for initial powers to decrease. The results obtained in the study of the AOTF as a cryptographer showed that it is possible to define a pair of parameters, called PPM/PAM pair, directly related to the modulations used in the process, which will serve as key to communications between two users in an optical network. The device would be used to encode and decode data.<br>O Estudo do Desempenho de Filtros Acústico-Ópticos Sintonizáveis (AOTF) como Componentes Biestáveis e sua Utilização na Criptografia em Redes Ópticas apresenta, primeiramente, um estudo analítico e numérico de tais filtros destacando suas principais propriedades de transmissão e analisando seu comportamento devido aos efeitos não-lineares e o surgimento da biestabilidade óptica quando um sistema de feedback é introduzido. Em seguida, propõe o uso do AOTF, somado à modulação de pulsos ultracurtos por posição (PPM) e por amplitude (PAM), simultaneamente, para gerar um sistema criptográfico a ser utilizado em redes ópticas. As simulações numéricas foram realizadas utilizando-se o método de Runge-Kutta de Quarta Ordem. Os resultados obtidos para o estudo da biestabilidade mostraram a dependência da curva de histerese com relação ao produto da constante de acoplamento pelo comprimento do dispositivo e ao fator de conversão potência-constante de propagação (G). Mostrou-se que o intervalo da biestabilidade varia significativamente tanto com G como com produto da constante de acoplamento pelo comprimento do dispositivo, mas suas contribuições são diferentes. A variação do produto da constante de acoplamento pelo comprimento do dispositivo aumenta o tamanho do intervalo da biestabilidade, enquanto que o aumento de G faz com que a biestabilidade ocorra para potências iniciais cada vez menores. Os resultados obtidos no estudo do AOTF como criptógrafo mostraram que é possível definir um par de parâmetros, chamado par PPM/PAM, diretamente relacionado com as modulações usadas no processo, que servirá como elemento fundamental para a comunicações entre dois usuários em uma rede óptica usando um AOTF para codificar a mensagem e outro para decodificar.
APA, Harvard, Vancouver, ISO, and other styles
31

Jaffal, Ali. "Single photon sources emitting in the telecom band based on III-V nanowires monolithically grown on silicon." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI019.

Full text
Abstract:
Une source de photons uniques (SPU) dans la bande télécom, épitaxiées sur un substrat de silicium (Si), est le Saint Graal pour réaliser des dispositifs CMOS compatibles pour les technologies de l'information optiques. Pour atteindre cet objectif, nous proposons la croissance monolithique de Boîte Quantiques-Nanofils (BQ-NFs) InAs/InP sur des substrats de silicium par épitaxie par jet moléculaire (EJM) en utilisant la méthode vapeur-liquide-solide (VLS). Au début, nous avons concentré nos efforts sur l'optimisation des conditions de croissance afin d'obtenir une densité de NF ultra-faible sans effort avant ou après la croissance, ce qui nous permet d'exciter optiquement un seul BQ-NF sur l'échantillon tel qu'il a été épitaxiées et de préserver la croissance monolithique sur le silicium. Par la suite, nous avons porté notre attention sur l'amélioration de l'extraction de la lumière de la BQ InAs du guide d'onde InP NF vers l'espace libre pour obtenir une source lumineuse avec un profil d'émission en Champ Lointain (CL) gaussien afin de coupler efficacement les photons individuels à une fibre optique monomode. Cela a été réalisé en contrôlant la géométrie de NF pour obtenir des NFs en forme d'aiguille avec un très petit angle de conicité et un diamètre de NF adapté pour supporter un guide d'onde monomode. Une telle géométrie a été produite avec succès en utilisant un équilibre induit par la température sur les croissances axiale et radiale pendant la croissance des NFs catalysée par l'or. Des mesures optiques ont confirmé la nature mono-photonique des photons émis avec g2(0) = 0,05 et un profil d'émission gaussien en CL avec un angle d'émission θ = 30°. Pour obtenir des performances optimales, nous avons ensuite abordé une question cruciale dans cette géométrie de NF représentée par l'état de polarisation inconnu des photons émis. Pour résoudre ce problème, une solution consiste à intégrer un seul BQ dans un NF avec une section asymétrique optimisée pour inhiber un état de polarisation et améliorer l'efficacité d'émission de l'autre. Une stratégie de croissance originale a été proposée, permettant d'obtenir des photons à haut degré de polarisation linéaire parallèle à l'axe allongé des NFs asymétriques. Enfin, l'encapsulation des BQ-NFs dans des guides d'ondes en silicium amorphe (a-Si) a ouvert la voie à la production des dispositifs des SPU entièrement intégrés sur Si dans un avenir proche<br>A telecom band single photon source (SPS) monolithically grown on silicon (Si) substrate is the Holy Grail to realize CMOS compatible devices for optical-based information technologies. To reach this goal, we propose the monolithic growth of InAs/InP quantum dot-nanowires (QD-NWs) on silicon substrates by molecular beam epitaxy (MBE) using the vapour-liquid-solid (VLS) method. In the beginning, we have focused our efforts on optimizing the growth conditions aiming at achieving ultra-low NWs density without any pre-growth or post-growth efforts allowing us to optically excite a single QD-NW on the as-grown sample and to preserve the monolithic growth on silicon. Subsequently, we have turned our attention on enhancing the InAs QD light extraction from the InP NW waveguide towards the free space to achieve a bright source with a Gaussian far-field (FF) emission profile to efficiently couple the single photons to a single-mode optical fiber. This was done by controlling the NW geometry to obtain needlelike-tapered NWs with a very small taper angle and a NW diameter tailored to support a single mode waveguide. Such a geometry was successfully produced using a temperature-induced balance over axial and radial growths during the gold-catalyzed growth of the NWs. Optical measurements have confirmed the single photon nature of the emitted photons with g2(0) = 0.05 and a Gaussian FF emission profile with an emission angle θ = 30°. For optimal device performances, we have then tackled a crucial issue in such NW geometry represented by the unknown polarization state of the emitted photons. To solve this issue, one solution is to embed a single QD in a NW with an asymmetrical cross-section optimized to inhibit one polarization state and to improve the emission efficiency of the other one. An original growth strategy was proposed permitting us to obtain highly linearly polarized photons along the elongated axis of the asymmetrical NWs. Finally, the encapsulation of the QD-NWs within amorphous silicon (a-Si) waveguides have opened the path to produce fully integrated SPSs devices on Si in the near future
APA, Harvard, Vancouver, ISO, and other styles
32

Lamoureux, Louis-Philippe. "Theoretical and experimental aspects of quantum cryptographic protocols." Doctoral thesis, Universite Libre de Bruxelles, 2006. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210776.

Full text
Abstract:
La mécanique quantique est sans aucun doute la théorie la mieux vérifiée qui n’a jamais existée. En se retournant vers le passé, nous constatons qu’un siècle de théorie quantique a non seulement changé la perception que nous avons de l’univers dans lequel nous vivons mais aussi est responsable de plusieurs concepts technologiques qui ont le potentiel de révolutionner notre monde.<p> <p>La présente dissertation a pour but de mettre en avance ces potentiels, tant dans le domaine théorique qu’expérimental. Plus précisément, dans un premier temps, nous étudierons des protocoles de communication quantique et démontrerons que ces protocoles offrent des avantages de sécurité qui n’ont pas d’égaux en communication classique. Dans un deuxième temps nous étudierons trois problèmes spécifiques en clonage quantique ou chaque solution<p>apportée pourrait, à sa façon, être exploitée dans un problème de communication quantique.<p><p>Nous débuterons par décrire de façon théorique le premier protocole de communication quantique qui a pour but la distribution d’une clé secrète entre deux parties éloignées. Ce chapitre nous permettra d’introduire plusieurs concepts et outils théoriques qui seront nécessaires dans les chapitres successifs. Le chapitre suivant servira aussi d’introduction, mais cette fois-ci penché plutôt vers le côté expériemental. Nous présenterons une élégante technique qui nous permettra d’implémenter des protocoles de communication quantique de façon simple. Nous décrirons ensuite des expériences originales de communication quantique basées sur cette technique. Plus précisément, nous introduirons le concept de filtration d’erreur et utiliserons cette technique afin d’implémenter une distribution de clé quantique bruyante qui ne pourrait pas être sécurisé sans cette technique. Nous démontrerons ensuite des expériences implémentant le tirage au sort quantique et d’identification quantique.<p><p>Dans un deuxième temps nous étudierons des problèmes de clonage quantique basé sur le formalisme introduit dans le chapitre d’introduction. Puisqu’il ne sera pas toujours possible de prouver l’optimalité de nos solutions, nous introduirons une technique numérique qui nous<p>permettra de mettre en valeur nos résultats.<p> <p><br>Doctorat en sciences, Spécialisation physique<br>info:eu-repo/semantics/nonPublished
APA, Harvard, Vancouver, ISO, and other styles
33

Sabban, Manuel. "Sécurité en cryptographie quantique utilisant la détection homodyne d'états cohérents à faible énergie." Phd thesis, Télécom ParisTech, 2009. http://pastel.archives-ouvertes.fr/pastel-00005898.

Full text
Abstract:
Le travail proposé est une réflexion sur la sécurité de certains protocoles de distribution de clefs quantiques. Nous avons choisi d'utiliser la phase d'états cohérents à faible énergie pour porter notre information. Deux principaux axes sont mis en valeurs. Le premier est une étude sur l'apport d'un mode différentiel sur un protocole à modulation de phase utilisant des compteurs de photons, et le deuxième correspond à une réflexion sur l'apport d'un double seuil dans les mesures à détection homodyne. Dans la partie dévolue à l'étude de la sécurité en mode différentiel nous nous sommes attachés tout d'abord à comparer quantitativement la sécurité pour un système à référence de phase absolue et un système fonctionnant en mode différentiel. Nous avons montré un gain dans le système différentiel, car la sécurité se répartit à la fois individuellement et collectivement sur les qubits. Ensuite nous avons développé une étude sur l'introduction d'un double seuil dans un système de cryptographie quantique à détection homodyne. L'intérêt de cette technique est de pouvoir prendre du recul sur les mesures des qubits, et pouvoir prendre une décision au vu de la fiabilité du résultat d'une mesure. Nous avons ensuite étudié l'impact de différentes attaques courantes sur ce système à homodynage à double seuil.
APA, Harvard, Vancouver, ISO, and other styles
34

Persechino, Mauro. "Étude experimentale de l'intégration d'un systèm de distribution quantique de clé à variables continues sur un circuit optique en silicium." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLO013/document.

Full text
Abstract:
Les évolutions récentes de la cryptographie quantique ont permis de proposer sur le marché des appareils de distribution quantique de clé secrète (QKD). Ceci est obtenu en utilisant soit des variables discrètes et des compteurs de photons (DV), soit des variables continues et des systèmes de détection cohérente (CV). Les avancées technologiques s'orientent maintenant vers la réalisation de dispositifs plus petits, moins chers, et plus commodes à utiliser.L'objectif de cette thèse est de mettre en oeuvre un protocole CV-QKD sur un circuit optique intégré en silicium, en utilisant une modulation Gaussienne d'états cohérents. Deux approches sont utilisées: dans la première l'émetteur Alice et le récepteur Bob sont sur le même circuit photonique (chip) pour une validation de principe, et dans la deuxième ils sont séparés.Les valeurs mesurées des paramètres de la communication permettent d'échanger une clé secrète<br>During recent years there have been significant developments in quantum cryptography, bringing quantum key distribution (QKD) devices on the market. This can be done by using either discrete variables (DV) and photon counting, or continuous variables (CV) and coherent detection. Current technological evolutions are now aiming at developing smaller, cheaper and more user-friendly devices.This work focuses on the implementation of CV-QKD using silicon photonics techniques, which provide a high degree of integration. This is exploited to build an on-chip realization of a cryptographic protocol, using Gaussian modulation of coherent states. Two different approaches have been used, first by physically implementing the sender (Alice) and the receiver (Bob) on the same chip for validation purposes, and then by having them onto two separate chips. The measured communication parameters give the possibility to extract a secret key
APA, Harvard, Vancouver, ISO, and other styles
35

SabÃia, Karlo David Alves. "Estudo do desempenho de filtros acÃsticos-Ãpticos sintonizÃveis como componentes biestÃveis e sua utilizaÃÃo na criptografia em redes Ãpticas." Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=4038.

Full text
Abstract:
CoordenaÃÃo de AperfeiÃoamento de Pessoal de NÃvel Superior<br>O Estudo do Desempenho de Filtros AcÃstico-Ãpticos SintonizÃveis (AOTF) como Componentes BiestÃveis e sua UtilizaÃÃo na Criptografia em Redes Ãpticas apresenta, primeiramente, um estudo analÃtico e numÃrico de tais filtros destacando suas principais propriedades de transmissÃo e analisando seu comportamento devido aos efeitos nÃo-lineares e o surgimento da biestabilidade Ãptica quando um sistema de feedback à introduzido. Em seguida, propÃe o uso do AOTF, somado à modulaÃÃo de pulsos ultracurtos por posiÃÃo (PPM) e por amplitude (PAM), simultaneamente, para gerar um sistema criptogrÃfico a ser utilizado em redes Ãpticas. As simulaÃÃes numÃricas foram realizadas utilizando-se o mÃtodo de Runge-Kutta de Quarta Ordem. Os resultados obtidos para o estudo da biestabilidade mostraram a dependÃncia da curva de histerese com relaÃÃo ao produto da constante de acoplamento pelo comprimento do dispositivo e ao fator de conversÃo potÃncia-constante de propagaÃÃo (G). Mostrou-se que o intervalo da biestabilidade varia significativamente tanto com G como com produto da constante de acoplamento pelo comprimento do dispositivo, mas suas contribuiÃÃes sÃo diferentes. A variaÃÃo do produto da constante de acoplamento pelo comprimento do dispositivo aumenta o tamanho do intervalo da biestabilidade, enquanto que o aumento de G faz com que a biestabilidade ocorra para potÃncias iniciais cada vez menores. Os resultados obtidos no estudo do AOTF como criptÃgrafo mostraram que à possÃvel definir um par de parÃmetros, chamado par PPM/PAM, diretamente relacionado com as modulaÃÃes usadas no processo, que servirà como elemento fundamental para a comunicaÃÃes entre dois usuÃrios em uma rede Ãptica usando um AOTF para codificar a mensagem e outro para decodificar.<br>The performance of acoustic-optic tunable filters (AOTF) as a bistable component, applied to cryptography in optical networks, has been studied with analytical and numerical methods. Initial investigations of such filters highlighted their main transmissions, and analyzed their behavior by nonlinear effects with formation of optical bistability when a feedback was introduced in the system. Subsequently, it was proposed the use of an AOTF device, together with simultaneous modulation of ultrashort pulses by position (PPM) and amplitude (PAM), for generation of a cryptographic system for application in optical networks. Numerical simulations were performed using the Runge-Kutta fourth order method. The results for the study of bistability showed the dependence of the hysteresis curve with respect to the product of coupling constant by the length of the device and the conversion power-coupling constant factor (G). It was shown that the range of bistability varies significantly with both G and the product of coupling constant by the length of the device. The variation of the product of coupling constant by the length of the device directly increases the size of the bistability range while the increase in G causes the bistability occurrence for initial powers to decrease. The results obtained in the study of the AOTF as a cryptographer showed that it is possible to define a pair of parameters, called PPM/PAM pair, directly related to the modulations used in the process, which will serve as key to communications between two users in an optical network. The device would be used to encode and decode data.
APA, Harvard, Vancouver, ISO, and other styles
36

Betchart, Burton A. "A Test of Bell’s Inequality for the Undergraduate Laboratory." Oberlin College Honors Theses / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1206296667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.

Full text
Abstract:
Data security will play a central role in the design of future IT systems. The PC has been a major driver of the digital economy. Recently, there has been a shift towards IT applications realized as embedded systems, because they have proved to be good solutions for many applications, especially those which require data processing in real time. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Most of these embedded applications will be wireless, which makes the communication channel vulnerable. The implementation of cryptographic systems presents several requirements and challenges. For example, the performance of algorithms is often crucial, and guaranteeing security is a formidable challenge. One needs encryption algorithms to run at the transmission rates of the communication links at speeds that are achieved through custom hardware devices. Public-key cryptosystems such as RSA, DSA and DSS have traditionally been used to accomplish secure communication via insecure channels. Elliptic curves are the basis for a relatively new class of public-key schemes. It is predicted that elliptic curve cryptosystems (ECCs) will replace many existing schemes in the near future. The main reason for the attractiveness of ECC is the fact that significantly smaller parameters can be used in ECC than in other competitive system, but with equivalent levels of security. The benefits of having smaller key size include faster computations, and reduction in processing power, storage space and bandwidth. This makes ECC ideal for constrained environments where resources such as power, processing time and memory are limited. The implementation of ECC requires several choices, such as the type of the underlying finite field, algorithms for implementing the finite field arithmetic, the type of the elliptic curve, algorithms for implementing the elliptic curve group operation, and elliptic curve protocols. Many of these selections may have a major impact on overall performance. In this dissertation a finite field from a special class called the Optimal Extension Field (OEF) is chosen as the underlying finite field of implementing ECC. OEFs utilize the fast integer arithmetic available on modern microcontrollers to produce very efficient results without resorting to multiprecision operations or arithmetic using polynomials of large degree. This dissertation discusses the theoretical and implementation issues associated with the development of this finite field in a low end embedded system. It also presents various improvement techniques for OEF arithmetic. The main objectives of this dissertation are to --Implement the functions required to perform the finite field arithmetic operations. -- Implement the functions required to generate an elliptic curve and to embed data on that elliptic curve. -- Implement the functions required to perform the elliptic curve group operation. All of these functions constitute a library that could be used to implement any elliptic curve cryptosystem. In this dissertation this library is implemented in an 8-bit AVR Atmel microcontroller.<br>Dissertation (MEng (Computer Engineering))--University of Pretoria, 2006.<br>Electrical, Electronic and Computer Engineering<br>unrestricted
APA, Harvard, Vancouver, ISO, and other styles
38

Chailloux, Andre. "Quantum coin flipping and bit commitment : optimal bounds, pratical constructions and computational security." Phd thesis, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00607890.

Full text
Abstract:
L'avènement de l'informatique quantique permet de réétudier les primitives cryptographiques avec une sécurité inconditionnelle, c'est à dire sécurisé même contre des adversaires tout puissants. En 1984, Bennett et Brassard ont construit un protocole quantique de distribution de clé. Dans ce protocole, deux joueurs Alice et Bob coopèrent pour partager une clé secrète inconnue d'une tierce personne Eve. Ce protocole a une sécurité inconditionnelle et n'a pasd'équivalent classique.Dans ma thèse, j'ai étudié les primitives cryptographiques à deux joueurs où ces joueurs ne se font pas confiance. J'étudie principalement le pile ou face quantique et la mise-en-gage quantique de bit. En informatique classique, ces primitivessont réalisables uniquement avec des hypothèses calculatoires, c'est-à-dire en supposant la difficulté d'un problème donné. Des protocoles quantiques ont été construits pour ces primitives où un adversaire peut tricher avec une probabilité constante strictement inférieure à 1, ce qui reste impossible classiquement. Néanmoins, Lo et Chau ont montré l'impossibilité de créer ces primitives parfaitement même en utilisant l'informatique quantique. Il reste donc à déterminer quelles sont les limites physiques de ces primitives.Dans une première partie, je construis un protocole quantique de pile ou face où chaque joueur peut tricher avec probabilité au plus 1/racine(2) + eps pour tout eps > 0. Ce résultat complète un résultat de Kitaev qui dit que dans un jeu de pile ou face quantique, un joueur peut toujours tricher avec probabilité au moins 1/racine(2). J'ai également construit un protocole de mise-en-gage de bit quantique optimal où un joueur peut tricher avec probabilité au plus 0,739 + eps pour tout eps > 0 puis ai montré que ce protocole est en fait optimal. Finalement, j'ai dérivé des bornes inférieures et supérieures pour une autre primitive: la transmission inconsciente, qui est une primitive universelle.Dans une deuxième partie, j'intègre certains aspects pratiques dans ces protocoles. Parfois les appareils de mesure ne donnent aucun résultat, ce sont les pertes dans la mesure. Je construis un protocole de lancer de pièce quantique tolérant aux pertes avec une probabilité de tricher de 0,859. Ensuite, j'étudie le modèle dispositif-indépendant où on ne suppose plus rien sur les appareils de mesure et de création d'état quantique.Finalement, dans une troisième partie, j'étudie ces primitives cryptographiques avec un sécurité computationnelle. En particulier, je fais le lien entre la mise en gage de bit quantique et les protocoles zero-knowledge quantiques.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Mengmeng. "Optical Image encryption based on apertured FrMT in the Diffraction domain." Thesis, Poitiers, 2019. http://www.theses.fr/2019POIT2326.

Full text
Abstract:
Cette thèse se concentre sur l'étude de l'introduction de l'ouverture dans la transformation frationnelle de Mellin (TFrM) dans le domaine de diffraction et son application dans le système de cryptage d'images optiques. La faisabilité des schémas de cryptage proposés est vérifiée par une série de simulations numériques. Les travaux principaux sont les suivants:Tout d'abord, un système de cryptage d'images optiques basé sur la transformation fractionnelle de Mellin avec une ouverture dure (TFrM à ouverture dure) a été proposé. La TFrM à ouverture dure peut être effectuée par la transformation log-polar et la transformation fractionnelle de Fourier à ouverture dans le domaine de diffraction. Les longueurs latérales de l'ouverture dure servent de clé pour améliorer la sécurité et augmenter encore l'espace clé du système de cryptage. Cette ouverture dure n'est pas seulement utilisée pour contrôler la quantité de lumière passant la lentille en ajustant sa taille, mais réduit également la fuite de lumière, ce qui, dans une certaine mesure, améliorera la robustesse contre les attaques directes.Deuxièmement, l'ouverture gaussienne, comme une ouverture douce pour équilibrer entre l'ouverture dure et aucune ouverture, est introduite dans la TFrM à ouverture. Avec la TFrM à ouverture gaussienne dans le domaine de diffraction, une transformation de préservation de la réalité est proposée et utilisée pour cryptage d'images. Dans ce schéma de cryptage pour l'image en niveaux de gris, la transformation d’Arnold et l'opération d’XOR bitwise sont également adoptées pour cypter l'image afin d'améliorer la sécurité.Enfin, l'algorithme de cryptage basé sur la TFrM à ouverture gaussian et de préservation de la réalité (TFrMOGPR) utilisé pour l'image couleur est proposé. Outre TFrMOGPR non linéaire, rotation de l'espace couleur, avec brouillage 3D et XOR opération bitwise rend l'algorithme de cryptage d'image de couleur proposé bien performer.Les résultats de la simulation ont montré que les systèmes de cryptage proposés sont capables de résister à différentes attaques communes et robustes contre les attaques de bruit et d'occlusion<br>This thesis focuses on the study of introducing the aperture into FrMT in diffraction domain (FrMT) and its application in optical image encryption system. The feasibility of the proposed encryption schemes is verified by a series of numerical simulations. The main work is as follows:Firstly, an optical image encryption scheme based on the fractional Mellin transform with a hard aperture has been proposed. The apertured fractional Mellin transform (apertured FrMT) can be performed through the log-polar transform and the apertured fractional Fourier transform in diffraction domain. The side-lengths of the hard aperture serve as a key to improve the security and further increase the key space of the encryption system. This hard aperture is not only used to control the amount of light passing the lens by adjusting its size, but also reduces the leakage of light, which will, to some extent, enhance the robustness against direct attacks.Secondly, the Gaussian aperture, as a soft aperture for balancing between hard aperture and no aperture, is introduced into the apertured FrMT. With the Gaussian apertured FrMT in diffraction domain, a reality-preserving transform is proposed and used for image encryption. In this encryption scheme, for gray image, the Arnold transform and the bitwise XOR operation are also adopted to encrypt the image in order to enhance the security.Finally, the encryption algorithm based on Gaussian apertured reality-preserving FrMT (GARPFrMT) used for color image is proposed. Besides, nonlinear GARPFrMT, color space rotation, together with 3D scrambling and bitwise XOR operation make the proposed color image encryption algorithm have good performance.The simulation results have shown that the proposed encryption schemes are capable of resisting different common attacks and robust against noise and occlusion attacks
APA, Harvard, Vancouver, ISO, and other styles
40

Ly, Aliou. "Développement d’un oscillateur paramétrique optique continu intense et à faible bruit pour des applications aux communications quantiques." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS528/document.

Full text
Abstract:
La portée des communications quantiques est limitée à quelques dizaines de km en raison de l’atténuation dans les fibres. Les répéteurs quantiques (relais quantiques synchronisés par des mémoires quantiques photoniques) furent introduits afin d’accroître ces distances. Or, pour le moment, les mémoires les plus performantes fonctionnent à des longueurs d’onde n’appartenant pas à la bande C télécom. Afin de profiter de ces mémoires, l’utilisation d’interfaces quantiques (milieu non linéaire quadratique) fut proposée comme alternative. En ajoutant ainsi par somme de fréquences un photon de pompe de longueur d’onde appropriée au photon télécom portant l’information, on transfère l’information à une longueur d’onde compatible avec les mémoires, et ceci sans dégradation de l’information portée initialement par le photon télécom. Notre but est ainsi de construire un oscillateur paramétrique optique continu simplement résonant (SRO) qui fournira un faisceau à 1648 nm qui sera sommé en fréquence aux photons télécom à 1536 nm pour transférer l’information vers un photon stockable dans une mémoire à base d’atomes alcalins. Pour transférer efficacement l’information, le SRO doit satisfaire quelques critères : une haute finesse spectrale (largeur de raie ~kHz), une forte puissance (~1W) et une longueur d’onde plus grande que celle du photon télécom à convertir. Pour ce faire, nous utilisons le faisceau non-résonant d’un SRO continu. Le premier travail réalisé dans cette thèse a été de faire la démonstration de la possibilité d’avoir un faisceau à la fois intense et pur spectralement en sortie d’un SRO continu. En réutilisant un SRO déjà développé durant nos travaux antérieurs, nous avons pu stabiliser au niveau du kHz la fréquence du faisceau non résonant à 947 nm (onde signal) de ce SRO, tout en émettant une puissance de plus d’un watt. Ensuite, nous avons conçu le SRO dont le faisceau non résonant à 1648 nm (onde complémentaire) a été stabilisé à court terme en-dessous du kHz avec une puissance de l’ordre du watt. Nous avons ensuite étudié la stabilité à long terme de la longueur d’onde du complémentaire à 1648 nm. Nous avons mesuré des dérives de fréquences de l’ordre de 10 MHz/mn. Ces dérives, venant essentiellement de la cavité de référence sur laquelle le SRO est asservi, peuvent être réduites en contrôlant activement la cavité d’une part, et en utilisant des techniques de stabilisation en fréquence robustes, d’autre part<br>Long distance quantum communications are limited to few tens of km due to the attenuation of light in telecom fibres. Quantum repeaters (quantum relays synchronized by photonic quantum memories) were introduced in order to increase distances. Or, currently, the most efficient memories do not operate at wavelengths in the telecom C band. In order to take advantage of these memories, the use of quantum interfaces (second order nonlinear medium) was proposed as an alternative. Thus, by adding by sum frequency generation a pump photon at an appropriate wavelength to the telecom photon carrying the information, one transfers the information to a wavelength compatible with these memories, and this with a preservation of the information initially carried by the telecom photon. Our aim is thus to build a continuous-wave singly resonant optical parametric oscillator (cw SRO) which will provide a wave at 1648 nm that will be frequency summed to telecom photons at 1536 nm to transfer the information to a photon storable into alkali atoms based memory. To efficiently transfer the information, the cw SRO has to fulfill some requirements: a high spectral purity (linewidth ~kHz), a high output power (~1 W) and a wavelength longer than that of the telecom photon to be converted. To this aim, we use the non-resonant wave of a cw SRO. The first work done during this thesis was to experimentally prove the possibility to have both high output power and high spectral purity from a cw SRO. By reusing a cw SRO already built during our previous works, we were able to stabilize at the kHz level the frequency of the non-resonant wave at 947 nm (signal wave) of this SRO, with an output power of more than one watt. Then, we built the cw SRO of which non-resonant wave at 1648 nm (idler wave) has been frequency stabilized below the kHz level along with an output power of the order of one watt. We next studied the long term stability of the idler wavelength at 1648 nm. We have measured frequency drifts of the order of 10 MHz/mn. These drifts originating mainly from the reference cavity to which the SRO is locked, can be reduced by, firstly, an active control of the cavity and by, secondly, the use of robust frequency stabilization techniques
APA, Harvard, Vancouver, ISO, and other styles
41

"Quantum cryptography and applications in the optical fiber network." Thesis, 2005. http://library.cuhk.edu.hk/record=b6073966.

Full text
Abstract:
In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton entanglement with a new protocol is proposed. Its advantages are: a larger information capacity can be obtained with a longer transmission distance and the detection of multiple photons is easier than that of a single photon. The security and attacks pertaining to such a system are also studied.<br>Lastly, a quantum random number generator based on quantum optics has been experimentally demonstrated. This device is a key component for quantum key distribution as it can create truly random numbers, which is an essential requirement to perform quantum key distribution. This new generator is composed of a single optical fiber coupler with fiber pigtails, which can be easily used in optical fiber communications.<br>Next, a quantum key distribution over wavelength division multiplexed (WDM) optical fiber networks is realized. Quantum key distribution in networks is a long-standing problem for practical applications. Here we combine quantum cryptography and WDM to solve this problem because WDM technology is universally deployed in the current and next generation fiber networks. The ultimate target is to deploy quantum key distribution over commercial networks. The problems arising from the networks are also studied in this part.<br>Quantum cryptography, as part of quantum information and communications, can provide absolute security for information transmission because it is established on the fundamental laws of quantum theory, such as the principle of uncertainty, No-cloning theorem and quantum entanglement.<br>Then quantum key distribution in multi-access networks using wavelength routing technology is investigated in this research. For the first time, quantum cryptography for multiple individually targeted users has been successfully implemented in sharp contrast to that using the indiscriminating broadcasting structure. It overcomes the shortcoming that every user in the network can acquire the quantum key signals intended to be exchanged between only two users. Furthermore, a more efficient scheme of quantum key distribution is adopted, hence resulting in a higher key rate.<br>Luo, Yuhui.<br>"January 2005."<br>Adviser: K. T. Chan.<br>Source: Dissertation Abstracts International, Volume: 67-01, Section: B, page: 0338.<br>Thesis (Ph.D.)--Chinese University of Hong Kong, 2005.<br>Includes bibliographical references.<br>Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.<br>Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.<br>Electronic reproduction. Ann Arbor, MI : ProQuest Information and Learning Company, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.<br>Abstracts in English and Chinese.<br>School code: 1307.
APA, Harvard, Vancouver, ISO, and other styles
42

Beaudry, Normand James. "Squashing Models for Optical Measurements in Quantum Communication." Thesis, 2009. http://hdl.handle.net/10012/4800.

Full text
Abstract:
Many protocols and experiments in quantum information science are described in terms of simple measurements on qubits. However, in an experimental implementation, the exact description of the measurement is usually more complicated. If there is a claim made from the results of an experiment by using the simplified measurement description, then do the claims still hold when the more realistic description is taken into account? We present a "squashing" model that decomposes the realistic measurement description into first a map, followed by a simplified measurement. The squashing model then provides a connection between a realistic measurement and an ideal measurement. If the squashing model exists for a given measurement, then all claims made about a measurement using the simplified description also apply to the complicated one. We give necessary and sufficient conditions to determine when this model exists. We show how it can be applied to quantum key distribution, entanglement verification, and other quantum communication protocols. We also consider several examples of detectors commonly used in quantum communication to determine if they have squashing models.
APA, Harvard, Vancouver, ISO, and other styles
43

Garg, Gagan. "Analysis Of A Sieving Heuristic For The Number Field Sieve And Design Of Low-Correlation CDMA Sequences." Thesis, 2009. http://hdl.handle.net/2005/1026.

Full text
Abstract:
In this thesis, we investigate in detail, certain important problems in cryptography and coding theory. In the first part of this thesis, we discuss the number field sieve and compare the two ways in which the sieving step is implemented -one method using the line sieve and the other using the lattice sieve. We discuss why the lattice sieve performs better than the line sieve in the presence of large primes -this has not been attempted before. In the second part of this thesis, we design low-correlation CDMA sequences over the Quadrature Amplitude Modulation (QAM) alphabet. The sequences proposed in this thesis have the lowest value of the maximum correlation parameter as compared to any other family in the literature. In the third part of this thesis, we design large families of optimal two-dimensional optical orthogonal codes for optical CDMA. The size of these codes is larger than any other code in the literature.
APA, Harvard, Vancouver, ISO, and other styles
44

Curty, Alonso Marcos [Verfasser]. "Cryptographic protocols in optical communication / vorgelegt von Marcos Curty Alonso." 2006. http://d-nb.info/979048621/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Zhao, Yi. "Quantum Cryptography in Rreal-life Applications: Assumptions and Security." Thesis, 2009. http://hdl.handle.net/1807/19307.

Full text
Abstract:
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most powerful eavesdropper cannot decrypt the message from a cipher. The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between the experiment and the theory can be fatal to the security of a QKD system. In this thesis we address a number of these discrepancies. A perfect single-photon source is often assumed in many security proofs. However, a weak coherent source is widely used in a real-life QKD implementation. Decoy state protocols have been proposed as a novel approach to dramatically improve the performance of a weak coherent source based QKD implementation without jeopardizing its security. Here, we present the first experimental demonstrations of decoy state protocols. Our experimental scheme was later adopted by most decoy state QKD implementations. In the security proof of decoy state protocols as well as many other QKD protocols, it is widely assumed that a sender generates a phase-randomized coherent state. This assumption has been enforced in few implementations. We close this gap in two steps: First, we implement and verify the phase randomization experimentally; second, we prove the security of a QKD implementation without the coherent state assumption. In many security proofs of QKD, it is assumed that all the detectors on the receiver's side have identical detection efficiencies. We show experimentally that this assumption may be violated in a commercial QKD implementation due to an eavesdropper's malicious manipulation. Moreover, we show that the eavesdropper can learn part of the final key shared by the legitimate users as a consequence of this violation of the assumptions.
APA, Harvard, Vancouver, ISO, and other styles
46

Ying-ChenLin and 林映辰. "Using Wavelength/Time Signatures Scrambling to Realize Cryptographic Optical CDMA Data Networks." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/60240590731960744030.

Full text
Abstract:
碩士<br>國立成功大學<br>電腦與通信工程研究所<br>102<br>Since the confidentiality performance in optical code-division multiple-access (OCDMA) network improves user signals safety, it has attracted considerable attention. OCDMA provides accessibility, robust performance, high flexibility and high security features. However designing the physical layer, the system still has a number of weaknesses, including vulnerable to eavesdropping, thus having confidentiality becomes an important issue. To prevent the system from being tapped, we propose reconfigurable arrayed-waveguide gratings (AWGs) and the maximal-length sequence (M-sequence) codes based on double scrambling signature to enhance the system security. Using the periodic and orthogonal advantage of M-sequence code, the on-off keying modulation is use to encode. The system according to different network conditions to control the reconfigurable signature rate. The state of optical switch and time delay will depend on shifting control register state. Central controller will monitor the network traffic in time. When detects security threats, a reconfiguring command will be sent and electrical shift register (SR) state change for controlling the optical switches and fiber delay line. Different states will cause to different output coding sequence. But the user still can recover the correct code completely. By frequency change the assigned code, eavesdropper can’t detection information correctly. In the thesis we mainly make a complete quantitative analysis for the confidentiality. The impact of code space and reconfigurable rate to the confidentiality are complete analysis. By the results show that double wavelength/time reconfiguration scheme can indeed improve the system security and achieve a certain effect.
APA, Harvard, Vancouver, ISO, and other styles
47

"17x bits elliptic curve scalar multiplication over GF(2M) using optimal normal basis." 2001. http://library.cuhk.edu.hk/record=b5890856.

Full text
Abstract:
Tang Ko Cheung, Simon.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2001.<br>Includes bibliographical references (leaves 89-91).<br>Abstracts in English and Chinese.<br>Chapter 1 --- Theory of Optimal Normal Bases --- p.3<br>Chapter 1.1 --- Introduction --- p.3<br>Chapter 1.2 --- The minimum number of terms --- p.6<br>Chapter 1.3 --- Constructions for optimal normal bases --- p.7<br>Chapter 1.4 --- Existence of optimal normal bases --- p.10<br>Chapter 2 --- Implementing Multiplication in GF(2m) --- p.13<br>Chapter 2.1 --- Defining the Galois fields GF(2m) --- p.13<br>Chapter 2.2 --- Adding and squaring normal basis numbers in GF(2m) --- p.14<br>Chapter 2.3 --- Multiplication formula --- p.15<br>Chapter 2.4 --- Construction of Lambda table for Type I ONB in GF(2m) --- p.16<br>Chapter 2.5 --- Constructing Lambda table for Type II ONB in GF(2m) --- p.21<br>Chapter 2.5.1 --- Equations of the Lambda matrix --- p.21<br>Chapter 2.5.2 --- An example of Type IIa ONB --- p.23<br>Chapter 2.5.3 --- An example of Type IIb ONB --- p.24<br>Chapter 2.5.4 --- Creating the Lambda vectors for Type II ONB --- p.26<br>Chapter 2.6 --- Multiplication in practice --- p.28<br>Chapter 3 --- Inversion over optimal normal basis --- p.33<br>Chapter 3.1 --- A straightforward method --- p.33<br>Chapter 3.2 --- High-speed inversion for optimal normal basis --- p.34<br>Chapter 3.2.1 --- Using the almost inverse algorithm --- p.34<br>Chapter 3.2.2 --- "Faster inversion, preliminary subroutines" --- p.37<br>Chapter 3.2.3 --- "Faster inversion, the code" --- p.41<br>Chapter 4 --- Elliptic Curve Cryptography over GF(2m) --- p.49<br>Chapter 4.1 --- Mathematics of elliptic curves --- p.49<br>Chapter 4.2 --- Elliptic Curve Cryptography --- p.52<br>Chapter 4.3 --- Elliptic curve discrete log problem --- p.56<br>Chapter 4.4 --- Finding good and secure curves --- p.58<br>Chapter 4.4.1 --- Avoiding weak curves --- p.58<br>Chapter 4.4.2 --- Finding curves of appropriate order --- p.59<br>Chapter 5 --- The performance of 17x bit Elliptic Curve Scalar Multiplication --- p.63<br>Chapter 5.1 --- Choosing finite fields --- p.63<br>Chapter 5.2 --- 17x bit test vectors for onb --- p.65<br>Chapter 5.3 --- Testing methodology and sample runs --- p.68<br>Chapter 5.4 --- Proposing an elliptic curve discrete log problem for an 178bit curve --- p.72<br>Chapter 5.5 --- Results and further explorations --- p.74<br>Chapter 6 --- On matrix RSA --- p.77<br>Chapter 6.1 --- Introduction --- p.77<br>Chapter 6.2 --- 2 by 2 matrix RSA scheme 1 --- p.80<br>Chapter 6.3 --- Theorems on matrix powers --- p.80<br>Chapter 6.4 --- 2 by 2 matrix RSA scheme 2 --- p.83<br>Chapter 6.5 --- 2 by 2 matrix RSA scheme 3 --- p.84<br>Chapter 6.6 --- An example and conclusion --- p.85<br>Bibliography --- p.91
APA, Harvard, Vancouver, ISO, and other styles
48

Kabeya, Mpinda. "Experimental realization of quantum key distribution." Thesis, 2009. http://hdl.handle.net/10413/8978.

Full text
Abstract:
Nowadays, the information society that presides the everyday life is dependent on the communication industry to facilitate unintelligible data transfers between authenticated parties. Human desire to communicate secretly since the beginnings of the civilisation. Methods of secret communication were developed by many ancient societies, including those of Mesopotamia, Egypt, India, China and Japan, but details regarding the origins of cryptology, i.e. the science and art of secure communication, remain unknown. Secure communication as well as the protection of sensitive data against unauthorised eavesdropping are inevitably important. For example, the device, used for communication between military commanders, consisted of a tapered baton around which was wrapped a spiral strip of parchment or leather containing the message. The key is a random sequence of 0’s and 1’s, and therefore the resulting cryptogram, i.e. the plaintext plus the key, is also random and completely scrambled unless one knows the key. Indeed, Shannon proved that if the key is secret, the same length as the message, truly random, and never reused, then the one-time pad is unbreakable. All one-time pads suffer from serious practical drawback, known as the key distribution problem. The key itself must be established between the sender and the receiver by means of a very secure channel for example a very secure telephone line, a private meeting or hand-delivery by a trusted courrier. Even if a secure channel is available, this security can never be truly guaranteed, a fondamental problem remains because any classical private channel can be monitored passively without the sender or receiver knowing that the eavesdropping has taken place. Since all information, including cryptographic keys, is encoded in measurable physical properties of some object or signal, classical theory leaves open the possibility of passive eavesdropping, because in principle it allows the eavesdropper to measure physical properties without disturbing them. This is not the case in quantum theory, which forms the basis for quantum cryptography. Modern cryptographic practice rests on the use of one-way functions which are easy to evaluate in the forward direction but infeasible to compute in the reverse direction without additional information. For example, multiplying large prime numbers can be done in a time that is a polynomial function of their size, but finding the prime factors of the product is believed to require exponential time. Factoring the product of two large prime numbers can be accomplished in polynomial time on a quantum computer. However, the advancement of computing power and the advent of the quantum computer together with the vulnerability of this scheme to mathematical progress have prompted the introduction of quantum cryptography which process through the laws of quantum mechanics, ensures provably secure data transfers. The use of physical mechanisms for cryptography is well known in quantum cryptography, based on the combinations of concept from quantum mechanics and information theory, i.e. the impossibility of cloning quantum information. The Heisenberg’s uncertainty principle is exploited to designe an unconditionally secure quantum communications schemes. Quantum cryptography mades enormous progress in the technology of quantum optics, optical fibers and free space optical communication. It can be used over a classical communications channel providing a physical protection to individual bits of information as well as a hardware implemented solution. The implementation of this theoretical concept requires much practical innovation for transparent deployment into current cryptographic solutions. The theory of quantum cryptography as well as its potential relevance and the application of prototype system at the University of KwaZulu-Natal are described and the phenomenon of single-photon interference is used to perform quantum cryptography over an optical communications link. The method of BB84 (a quantum key distribution protocol that works with qubits which are two-dimensional) is presented to solve the problem of key distribution between two parties. Theoretically, BB84 is secured under certain conditions. The practical of id 3000 Clavis (quantum key distribution system) over installed terrestrial cables of distances 13,08 km at Cato Manor in Durban between Central Application Office and Minicipal original Office buildings and 15.6 km in Pinetown between Pinetown Civic Center and Pinetown Clinic buildings is the proof that the solution to the key distribution problem is given by quantum cryptography. The experiments in this work are the practical real quantum key distribution that produces the key which can be shared between two parties at the distances enunciated above.<br>Thesis (M.Sc.)-University of KwaZulu-Natal, Westville, 2009.
APA, Harvard, Vancouver, ISO, and other styles
49

Yu, Kewei. "Optimal Pairings on BN Curves." Thesis, 2011. http://hdl.handle.net/10012/6131.

Full text
Abstract:
Bilinear pairings are being used in ingenious ways to solve various protocol problems. Much research has been done on improving the efficiency of pairing computations. This thesis gives an introduction to the Tate pairing and some variants including the ate pairing, Vercauteren's pairing, and the R-ate pairing. We describe the Barreto-Naehrig (BN) family of pairing-friendly curves, and analyze three different coordinates systems (affine, projective, and jacobian) for implementing the R-ate pairing. Finally, we examine some recent work for speeding the pairing computation and provide improved estimates of the pairing costs on a particular BN curve.
APA, Harvard, Vancouver, ISO, and other styles
50

Fishbein, Dieter. "Machine-Level Software Optimization of Cryptographic Protocols." Thesis, 2014. http://hdl.handle.net/10012/8400.

Full text
Abstract:
This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange protocol proposed by Jao et al.. As the use of mobile devices increases, the deployment of practical cryptographic protocols designed for use on these devices is of increasing importance. Furthermore, we are faced with the possible development of a large-scale quantum computer in the near future and must take steps to prepare for this possibility. We describe the key-exchange protocol of Jao et al. and discuss their original implementation. We then describe our modifications to their scheme that make it suitable for use in mobile devices. Our code is between 18-26% faster (depending on the security level). The second is an highly optimized implementation of Miller's algorithm that efficiently computes the Optimal Ate pairing over Barreto-Naehrig curves proposed by Grewal et al.. We give an introduction to cryptographic pairings and describe the Tate pairing and its variants. We then proceed to describe Grewal et al.'s implementation of Miller's algorithm, along with their optimizations. We describe our use of hand-optimized assembly code to increase the performance of their implementation. For the Optimal Ate pairing over the BN-446 curve, our code is between 7-8% faster depending on whether the pairing uses affine or projective coordinates.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!