Quantum cryptography - The analysis of security requirements

This article describes the security requirements of communication systems from quantum cryptography point of view. The background of consideration is the model of secure communication system, presented in ITU-T recommendation X.805. The requirements are described in two sections: end-users requirements, which should be clarified at the beginning of security architecture designing and system requirements, which should be met before quantum cryptography implementation.

[1]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  Neil A. M. Maiden User Requirements and System Requirements , 2008, IEEE Software.

[4]  Xuejia Lai,et al.  A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.

[5]  Moshe Oron,et al.  An Introduction to PON Technologies , 2007 .

[6]  Chip Elliott,et al.  Quantum Cryptography , 2004, IEEE Secur. Priv..

[7]  ITU-T Rec. X.805 (10/2003) Security architecture for systems providing end-to-end communications , 2004 .

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Thomas Pfeiffer,et al.  An introduction to PON technologies [Topics in Optical Communications] , 2007, IEEE Communications Magazine.

[10]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[11]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[12]  Peter W. Shor,et al.  Quantum Information Theory , 1998, IEEE Trans. Inf. Theory.

[13]  L. Adleman,et al.  The use of public key cryptography in communication system design , 1978, IEEE Communications Society Magazine.