skip to main content
10.1145/863955.863982acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Quantum cryptography in practice

Published: 25 August 2003 Publication History
  • Get Citation Alerts
  • Abstract

    BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) fiber. In this paper, we introduce quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our extensions to IPsec to integrate it with quantum cryptography.

    References

    [1]
    C. Bennett and G. Brassard, "Quantum Cryptography: Public Key Distribution and Coin Tossing," International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 1984.]]
    [2]
    C. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, "Experimental quantum cryptography," J. Cryptology, vol. 5, no. 1, 1992, pp. 3--28.]]
    [3]
    R. Hughes et al, "Quantum cryptography over underground optical fibers," in N Koblitz, editor, Advances in Cryptology -- CRYPTO '96, volume 1109 of Lecture Notes in Computer Science, pages 329--342, 18--22 August 1996. Springer-Verlag.]]
    [4]
    D. Stucki, N. Gisin, O. Guinnard, G. Ribordy and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New J. Phys. 4 (July 2002) 41.]]
    [5]
    D. Bethune and W. Risk, "Autocompensating quantum cryptography," New J. Phys. 4 (July 2002) 42.]]
    [6]
    R. Hughes, J. Nordholt, D. Derkacs and C. Peterson, "Practical free-space quantum key distribution over 10 km in daylight and at night," New J. Phys. 4 (July 2002) 43.]]
    [7]
    J. Rarity, P. Tapster, P. Gorman and P. Knight, "Ground to satellite secure key exchange using quantum cryptography," New J. Phys. 4 (October 2002) 82.]]
    [8]
    G. Ribordy, J. Brendel, J-D. Gautier, N. Gisin, and H. Zbinden, "Long-distance entanglement-based quantum key distribution," Phys. Rev. A, v. 63, 012309 (13 December 2000).]]
    [9]
    W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. 84, 4737 (2000).]]
    [10]
    A. Ekert, "Quantum Cryptography Based on Bell's Theorem," Phys. Rev. Lett. 67, 661 (5 August 1991).]]
    [11]
    C. Bennett, 1992, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett. 68, 3121--3124.]]
    [12]
    J. Franson, "Bell Inequality for Position and Time," Phys. Rev. Lett., 62, 2205 (8 May 1989).]]
    [13]
    G. Brassard, T. Mor, and B. Sanders, "Quantum crypto-graphy via parametric downconversion," quant-ph/9906074.]]
    [14]
    D. Naik, C. Peterson, A. White, A. Berglund, and P. Kwiat, Phys. Rev. Lett. 84, 4733 (2000).]]
    [15]
    T. Jennewin, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, Phys. Rev. Lett. 84, 4729 (2000).]]
    [16]
    D. Enzer, P. Hadley, R. Hughes, C. Peterson and P. Kwiat, "Entangled-photon six-state quantum cryptography," New J. Phys. 4 (July 2002) 45.]]
    [17]
    N. Gisin et al, "Quantum cryptography," Rev. Mod. Phys., Vol. 74, No. 1, January 2002.]]
    [18]
    C. Elliott, "Building the quantum network," New J. Phys. 4 (July 2002) 46.]]
    [19]
    G. Brassard and L. Salvail, "Secret key reconciliation by public discussion," Lect. Notes in Computer Science 765, 410. (1994).]]
    [20]
    M. Wegman and L. Carter, "New Hash Functions and their Use in Authentication and Set Equality," J. Comp. Sys. Sci., 22, 265--279 (1981).]]
    [21]
    B. Slutsky, R. Rao, P. Sun, L. Tancevski, and S. Fainman, "Defense frontier analysis of quantum cryptographic systems," Applied Optics, vol. 37, no. 14, 1998, pp. 2869--2878.]]

    Cited By

    View all
    • (2024)An On-Demand Fault-Tolerant Routing Strategy for Secure Key Distribution NetworkElectronics10.3390/electronics1303052513:3(525)Online publication date: 27-Jan-2024
    • (2024)Experimental demonstration of a quantum downstream access network in continuous variable quantum key distribution with a local local oscillatorPhotonics Research10.1364/PRJ.51914012:6(1262)Online publication date: 31-May-2024
    • (2024)Large-scale quantum key distribution network simulatorJournal of Optical Communications and Networking10.1364/JOCN.50335616:4(449)Online publication date: 12-Mar-2024
    • Show More Cited By

    Index Terms

    1. Quantum cryptography in practice

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
      August 2003
      432 pages
      ISBN:1581137354
      DOI:10.1145/863955
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 August 2003

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IPsec
      2. cryptographic protocols
      3. error correction
      4. key agreement protocols
      5. privacy amplification
      6. quantum cryptography
      7. quantum key distribution
      8. secure networks

      Qualifiers

      • Article

      Conference

      SIGCOMM03
      Sponsor:

      Acceptance Rates

      SIGCOMM '03 Paper Acceptance Rate 34 of 319 submissions, 11%;
      Overall Acceptance Rate 554 of 3,547 submissions, 16%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)605
      • Downloads (Last 6 weeks)71

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)An On-Demand Fault-Tolerant Routing Strategy for Secure Key Distribution NetworkElectronics10.3390/electronics1303052513:3(525)Online publication date: 27-Jan-2024
      • (2024)Experimental demonstration of a quantum downstream access network in continuous variable quantum key distribution with a local local oscillatorPhotonics Research10.1364/PRJ.51914012:6(1262)Online publication date: 31-May-2024
      • (2024)Large-scale quantum key distribution network simulatorJournal of Optical Communications and Networking10.1364/JOCN.50335616:4(449)Online publication date: 12-Mar-2024
      • (2024)Concurrent Entanglement Routing for Quantum Networks: Model and DesignsIEEE/ACM Transactions on Networking10.1109/TNET.2023.334374832:3(2205-2220)Online publication date: Jun-2024
      • (2024)Quantum Secure Communication Scheme for Power Dispatching Data2024 IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)10.1109/IAEAC59436.2024.10503834(1907-1913)Online publication date: 15-Mar-2024
      • (2024)Quantum Cryptography in 5G Networks: A Comprehensive OverviewIEEE Communications Surveys & Tutorials10.1109/COMST.2023.330905126:1(302-346)Online publication date: Sep-2025
      • (2023)Applications, Restrictions, and Evaluation of Quantum Cryptography for Secure Unmanned Aerial Vehicle CommunicationInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology10.32628/CSEIT2390634(232-246)Online publication date: 1-Dec-2023
      • (2023)Design of Cryptosystem Architecture Based on Quantum Key Distribution2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)10.1109/ICISCAE59047.2023.10393681(200-205)Online publication date: 23-Sep-2023
      • (2023)Design a Quantum Cryptography Algorithm and Evaluate the Risks of Quantum-Based Nano ComputingBig Data and Cloud Computing10.1007/978-981-99-1051-9_3(31-47)Online publication date: 11-Jun-2023
      • (2023)Quantum Network Architecture and Its TopologyQuantum Computing: A Shift from Bits to Qubits10.1007/978-981-19-9530-9_11(183-200)Online publication date: 30-Mar-2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media