مطالب مرتبط با کلیدواژه

Quantum cryptography


۱.

Quantum Cryptography in Telecommunications as a New Era of Secure Communications(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Quantum cryptography telecommunications quantum key distribution (QKD) secure communications data security quantum-resistant algorithms Encryption Cyber Threats quantum mechanics post-quantum cryptography

حوزه‌های تخصصی:
تعداد بازدید : ۲۶ تعداد دانلود : ۲۷
Background: Quantum Key Distribution (QKD) has turned into a crucial point for secure communication in the era of quantum networks. Quantum key distribution provides the client with a theoretically secure key by taking advantage of the principles of quantum mechanics to counteract what could be posed by quantum computing to classical cryptography. Photons are lost in the system and there are some limitations which don’t allow scalability and integration with already existing networks. Objective: The study seeks to assess the viability of QKD systems, review some of the challenges associated with it, and investigate possible methods of utilizing both QKD and PQC to cope with new security threats in telecommunication industry. Methods: An in-depth analysis was made based on the experimental observations of key generation rates, photon loss, error correction, data throughput, and latency. Performance of quantum repeaters was experimented with for the purposes of measuring distance improvement abilities. A combined QKD-PQC approach was assessed for integrated integration for restricted settings. Results: QKD was seen to have high security and high performance in short distances and when quantum repeaters were implemented the distance could be greatly enhanced. In the QKD-PQC model, the rate of error correction, throughput, and scalability was noticed to be higher than in standalone QKD. Challenges that faced the work were photon loss, processing latency, and system vulnerabilities. Conclusion: New opportunities for secure communication are opened with QKD supported by quantum repeaters and hybrid cryptographic approaches. The technical and operational issues need to be resolved to realize the potential role of B3G evolution in enabling global telecommunications for the mass market.
۲.

Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Quantum cryptography QKD PQC Hybrid Cryptography Quantum Computing Post-Quantum Security Scalability Quantum Threats Cryptographic Vulnerabilities Resource Optimization

حوزه‌های تخصصی:
تعداد بازدید : ۳۱ تعداد دانلود : ۳۰
  Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) algorithms. Huge requirements for cryptographic frameworks that can withstand quantum hacking have inspired Quantum Key Distribution (QKD), Post-Quantum Cryptography (PQC), and systems that use both. Objective: The aim of this article is to review the performance, scalability and integration of quantum-secure cryptographic services, with a practical lens on how they can be used in real-time environments like self-driving cars, industrial IoT, and intelligent health systems. It also aims at establishing the drawback of the current model and directions for further enhancement. Methods: The study employs simulative experimentation to understand lest exposures to quantum algorithms and rates cryptographic systems on standards such as latency, Quantum Bit Error Rate (QBER), computational overhead, scalability, and cost. Comparative assessment furniture integrated analysis of QKD, PQC, and hybrid system by identifying the advantages and disadvantage of each system. Results: As a result, adopting hybrid systems provided the best or comparable median results with lowest latency in real-time applications of ~45 ms or lower compared to alternative Multi-Access Edge Computing (MEC) architectures and types of security elements at high scalability. Thus, QKD, while being exceptional in security, has the problem of scalability, while PQC had average results on the given parameters. Conclusion : Quantum threats are adequately dealt with by hybrid cryptographic systems as this study has also pointed out. It is seen that initiation to future work may someday distribute resources effectively, expedite PQC standardization, and embrace artificially intelligent network frameworks for flexibility and expansiveness across different networks.