Secrets and light
Par taz le lundi 21 novembre 2011, 19:00 - Science - Lien permanent
Is a book relating the history of quantum key distribution needed? For sure.
As quantum key distribution (QKD) becomes more and more used to encrypt data on networks, there is an emerging need for a popular account of its history. QKD is, after all, the first real-world application taking advantage of the quantum properties of particles at the individual level. Hence, such a book is craving to be authored. The outline could be along the lines of[1]:
- Motivational introduction - How real-world quantum key distribution was used in referendums in Geneva or during the 2010 soccer world cup in South Africa.
- Brief history of classical cryptography - as described in Simon Singh's Code Book and in Bruce Schneier's Applied Cryptography.
- The first steps of cryptography - Caesar, Vigenère, steganography, etc
- Cryptography goes professional - 20th Century: encryption systems become weapons (WWII with Enigma, DES and PGP later)
- A short review of modern mathematical cryptography
- Private key cryptography: one-time pad, Blowfish, AES, ...
- Public key cryptography: Diffie-Hellmann, El-Gamal, RSA
- The advent of physical cryptography
- An anecdotal side effect of QM formalism - Wiesner70, BB84, Ekert91
- The cornerstone of QKD - the no-cloning theorem
- Overview of a QKD scheme e.g. BB84; from the photon source to the sifted key
- Ideas underlying security proofs - what is the QBER, why it is important
- What isn't QKD
- QKD isn't a method for encryption, but for key distribution, to be combined with symmetric encryption
- QKD's security isn't unconditional (problem of authentication, QKA)
- History of QKD achievements - in terms of speed, distances...
- From laboratories to commercial systems
- Who is interested in QKD
- Arguments in favour of QKD
- time-vulnerability of asymmetric encryption
- detection of eavesdroppers
- History of pioneer start-ups - idQ, MagiQ, Smartquantum, ...
- Attacks against QKD: quantum hacking
- Simple attacks, simple remedies
- Security holes due to implementation
- Attacks on commercial systems as a proof of maturity
- Competition between defenders and attackers
- Connections
- Bit commitment
- Quantum private queries
- Positional authentication
- Teleportation
- Perspectives
- The problem of the unknown dimension of Alice and Bob's Hilbert space
- Device-independent QKD - connection with nonlocality and violation of Bell inequalities
- Post-modern security of QKD
- Technical appendixes
- Formalism of BB84
- RNG, QRNG, DIQRNG
In the end, the remaining question is: who will write it?
Notes
[1] This outline draft is likely to be updated at random moments.
13 derniers coms