Cart (Loading....) | Create Account
Close category search window
 

Chaotic quantum cryptography: The ultimate for network security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Kartalopoulos, Stamatios ; University of Oklahoma, U.S.A.

As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an effort to create the “holy grail” of cryptographic systems and network security. Quantum theory defines the non-classical qubit, which is the superposition of quantum states having no classical analog. It is also based on the “no cloning” and “no copying” theorem and on the Heisenberg's uncertainty. The quanto-mechanical properties of photons and the quantum mechanics provide a superb platform for communications security and particularly in secure optical communication networks, known as quantum cryptography and quantum networks, respectively. Chaos is based on the particular behavior of certain non-linear functions, which for a minute change of parameters produce a huge and unstable output, known as the “chaotic regime”. However, this chaos can be reproducible, which makes it attractive to secure communications. Thus, the combined Chaos and Quantum theories play a synergistic role in the quest for the “holy grail” in communications security. In this talk we explain with simple examples quantum cryptography and protocols, as well as chaos and chaotic processes. We also describe the synergy of chaos and quantum theories as well as the increased efficiency and speed of the quantum key establishment.

Published in:

Wireless Information Networks and Systems (WINSYS), Proceedings of the 2010 International Conference on

Date of Conference:

26-28 July 2010

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.