Welcome to cissp CISSP training Certified Information Systems Security Professional
Nickname Password Security Code Security Code Type Security Code  

CompTIA Security+ Tutorial CBT quiz cram

Become a Cyber Warrior get the CEH V8 now

Rated #1 Training

Best hacking and penetration testing  magazine in the world


Where do you find the best price for books?

The ISC2 webstore
At a physical book store
Other (Please leave a comment with name of site)


Votes 2159

Who's Online

There are currently, 108 guest(s) and 7 member(s) that are online.

You are Anonymous user. You can register for free by clicking here

Quantum Cryptography Cost are being reduced greatly
Posted on Wednesday, 04 June 2008 @ 02:22:07 CEST
Contributed by cdupuis | Topic: Cryptography

Two for One: NIST Design Enables More Cost Effective Quantum Key Distribution

schematic drawing

A highly simplified schematic of a recipient's detectors in a quantum cryptography setup. Conventional cryptography setups (left) require at least two detectors, and the most common setup, known as BB84, requires four. By adding an optical component that delays the travel of photons to the detector, the number of required detectors is cut in half.

Credit: NIST

Researchers at the National Institute of Standards and Technology (NIST) have demonstrated a simpler and potentially lower-cost method for distributing strings of digits, or “keys,” for use in quantum cryptography, the most secure method of transmitting data. The new “quantum key distribution” (QKD) method, outlined in an upcoming paper,* minimizes the required number of detectors, by far the most costly components in quantum cryptography. Although this minimum-detector arrangement cuts transmission rates by half, the NIST system still works at broadband speeds, allowing, for example, real-time quantum encryption and decryption of webcam-quality video streams over an experimental quantum network.

In quantum cryptography, a recipient (named Bob) needs to measure a sequence of photons, or particles of light that are transmitted by a sender (named Alice). These photons have information encoded in their polarization, or direction of their electric field. In the most common polarization-based protocol, known as BB84, Bob uses four single-photon detectors, costing approximately $5,000-$20,000 each. One pair of detectors records photons with horizontal and vertical polarization, which could indicate 0 and 1 respectively. The other pair detects photons with “diagonal”, or +/- 45 degree, polarization in which the “northeast” and “northwest” directions alternatively denote 0 and 1.

In the new method, the researchers, led by NIST’s Xiao Tang, designed an optical component to make the diagonally polarized photons rotate by a further 45 degrees and arrive at the same detector but later, and into a separate “time bin”, than the horizontal/vertical polarized ones. Therefore, one pair of detectors can be used to record information from both kinds of polarized photons in succession, reducing the required number of detectors from four to two. In another protocol, called B92, the researchers reduced the required number of detectors from two to one. And in work performed since their new paper, the researchers further developed their approach so that the popular BB84 method now only requires one detector instead of four.

Although in theory quantum cryptography can transmit absolutely secure keys guaranteed by fundamental physical principles (measuring them will disturb their values and make an eavesdropper instantly known), the imperfect properties of photon detectors may undermine system security in practice. For example, photon detectors have an intrinsic problem known as “dead time,” in which a detector is out of commission for a short time after it records a photon, causing it to miss the bit of data that immediately follows; this could result in non-random (and therefore more predictable) bit patterns in which 0s alternate with 1s. Furthermore, inevitable performance differences between detector pairs can also cause them to record less random sequences of digits. The new design avoids these issues and maintains the security of quantum-key-distribution systems in practical applications.

* L. Ma, T. Chang, A. Mink, O. Slattery, B. Hershman and X. Tang. Experimental demonstration of a detection-time-bin-shift polarization encoding quantum key distribution system. IEEE Communications Letters Vol. 12, No. 6, June 2008. In press.

Media Contact: Ben Stein, [email protected], (301) 975-3097





Security Code:
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Related Links

· More about Cryptography
· News by boss

Most read story about Cryptography:
A new cryptography download area

Article Rating

Average Score: 0
Votes: 0

Please take a second and vote for this article:

Very Good


Re: Quantum Cryptography Cost are being reduced greatly (Score: 1)
by shopyland on Tuesday, 22 June 2010 @ 04:51:14 CEST
(User Info | Send a Message)

Good news

thank you


kral oyun [www.minikperi.tv]             
e learning [www.funnylearn.com]               
rent a car [www.rentacarx.com]               
video 75 arama motoru [www.video75.biz]                   
car coloring [www.car-coloring.com]           
mobilya dekorasyon [www.haberab.com]               
kral oyun [www.minikperi.tv]       
organik pazar [www.organikyerim.com]       
muhabbet kuşu [www.muhabbet-kusu.com]               
oyunlar [www.oyunlar.in]           
oyun [www.oyunya.com]

replica watches (Score: 1)
by replicahandbag on Friday, 23 July 2010 @ 23:44:16 CEST
(User Info | Send a Message)

Some people are lured into Franck Muller watches [www.thefirstwatches.com]buying those people products regardless replica watches [www.thefirstwatches.com]using the insanity that Maurice Lacroix for sale [www.standardwatch.com]remains concerning their cost tag. One may Ferrari for sale [www.standardwatch.com]possibly invest a fortune on a certain Concord for sale [www.qualityfirstwatch.com] only to use it for a brief time time Bvlgari watches [www.qualityfirstwatch.com]period and then purchase another, just because A.Lange & Sohne replica [www.poperwatches.com] of the fact that it can be no designer handbags [www.thetotebag4u.com] longer trendy.On the other hand with a Patek Philippe replica [www.poperwatches.com] this Piaget replica [www.poperwatches.com] problem may possibly be easily avoided. If you are someone who is obsessed acquiring coach replica handbags [www.thetotebag4u.com]the trendiest handbag, you may possibly thomas wylde [www.thelacebags.com]be in a position do that with no wasting Cheap Handbags [www.thelacebags.com] a fortune on it. For nearly every balenciaga handbags [www.marisabags.com] designer handbag, a chanel handbags [www.marisabags.com] could be produced within a brief time time coach handbags [www.marisabags.com] period that could be an exact replica handbags [www.mylacebags.com]replica of it; and most using the Mulberry bags [www.mylacebags.com] time one may possibly have a challenging time figuring out Marc jacob handbags [www.mylacebags.com].

Re: Quantum Cryptography Cost are being reduced greatly (Score: 1)
by 3ebada on Saturday, 07 August 2010 @ 08:33:41 CEST
(User Info | Send a Message)


سعودي كام [www.saudi4cam.com] -
دردشة سعودي كام [www.saudi4cam.com] -
شات سعودي كام [www.saudi4cam.com] -
منتديات سعودي كام [www.saudi4cam.com] -
شات سعودي [www.saudi4cam.com] -
سعودى كام [www.saudi4cam.com] -
دردشة سعودي كام الصوتية [www.saudi4cam.com] -
شات سعودي كام الصوتي [www.saudi4cam.com] -
دردشة صوتية [www.saudi4cam.com] -
شات صوتي [www.saudi4cam.com] -
يوتيوب [tube.ksa4cam.com] -
سعودي كام [www.saudi4cam.com] -
سعودي كام [www.saudi4cam.com]


سعودي كام [www.saudi4cam.com] -
سعودي كام [www.saudi4cam.com] -
سعودي كام [www.saudi4cam.com] -
سعودي كام [www.saudi4cam.com] -
سعودي كام [www.saudi4cam.com]

دردشة [www.khjl.com] - شات [www.khjl.com]
- دردشة صوتية [www.saudi4cam.com] - شات صوتي [www.saudi4cam.com] - منتديات [www.forums.girlgulf.com] [www.khjl.com] -
منتدي [www.khjl.com] - شات

سعودي كول [www.ksaco0ol.com] -
شات سعودي كول [www.ksaco0ol.com] -
دردشة سعودي كول [www.ksaco0ol.com] -
منتديات سعودي كول [www.ksaco0ol.com] -
منتدي سعودي كول [www.ksaco0ol.com] -

Read the rest of this comment...

mbt shoes (Score: 1)
by yun on Tuesday, 24 August 2010 @ 04:09:46 CEST
(User Info | Send a Message)

MBT [www.mbtstore.org] is a revolution of an innovative training method. MBT shoes clearance [www.mbtstore.org] gap affects the entire body and provides a unique and interesting design, reduce the harmful effects. The unique design unique MBT shoes [www.mbtstore.org], and appropriate training, to achieve a more active walking posture and health. Casual fashion MBT kisumu [www.mbtstore.org] sandals, elegant and simple look for movement of the MBT Kimondo [www.mbtstore.org] shoes, or fitness for more comfortable MBT Baridi [www.mbtstore.org] shoes, will be your best choice, in our site. When you wear stylish Moncler [www.discount-monclerjacket.com], you would like to let your personality show a significant act anything, moncler jackets [www.discount-monclerjacket.com] unique style, so that you fully shown women sophisticated side. moncler coats [www.discount-monclerjacket.com] without breaking the rigid personality coat, kind of all themselves. moncler jacket [www.discount-monclerjacket.com] coating used on the inside of hairy help maintain a normal body temperature, very warm people can enjoy. I believe we are no strangers to the timberland boots [www.cheap-timberlandboots.net], this brand can be said in public is gourmet, there is no critical timberland boots uk [www.cheap-timberlandboots.net], not only look beautiful to attract a lot of people like the warmth of shoes is to win a lot of human heart. In our website, timberland boots sale [www.cheap-timberlandboots.net] has been most beneficial to provide to the people most worthy of preferential treatment.

Re: Quantum Cryptography Cost are being reduced greatly (Score: 1)
by zhouyun on Saturday, 04 September 2010 @ 01:20:07 CEST
(User Info | Send a Message)


http://www.coachshandbags.com  Coach outlet [www.coachshandbags.com] 

http://www.coachshandbags.com    coach bags [www.coachshandbags.com]

http://www.coachshandbags.com    coach outlet store online [www.coachshandbags.com]


http://www.chanelsonline.com  chanel bags [www.chanelsonline.com]

http://www.chanelsonline.com    chanel online [www.chanelsonline.com]

http://www.chanelsonline.com    chanel handbags [www.chanelsonline.com]


http://www.mylouisvuitton.com  louis vuitton outlet [www.mylouisvuitton.com]

http://www.mylouisvuitton.com    louis vuitton sale [www.mylouisvuitton.com]

http://www.mylouisvuitton.com    louis vuitton handbags [www.mylouisvuitton.com]


http://www.suprasfootwear.org    supra skytop [www.suprasfootwear.org]

http://www.suprasfootwear.org    supras [www.suprasfootwear.org]

http://www.suprasfootwear.org  Supra Shoes [www.suprasfootwear.org]


http://www.guccis.net    gucci handbags [www.guccis.net]

http://www.guccis.net  gucci outlet  [www.guccis.net]

http://www.guccis.net  gucci bags [www.guccis.net]


http://www.mbts.cc    MBT Shoes [www.mbts.cc]
Read the rest of this comment...

All logos and trademarks in this site are property of their respective owner.
The comments are property of their posters, all the rest © 2007 by CCCure.Org, and the site maintainers Clement Dupuis and Nathalie Lambert. Reuse is strictly prohibited without written permission of CCCure.Org or it's maintainers.

This web site is not associated directly or indirectly with ISC2, the SANS Institute, ISACA, or other certification authority. The GCFW, CISSP, SSCP, ISSEP, ISSMP, CISA, and CISM are all the property of their respecful owners. The content of this site is provided to you freely due to the generosity of our sponsors.

  • Career
  • Magazines
  • Conferences
  • Study Books
  • Certifications
  • Training
  • Tutorials
  • Quizzes
  • Forums

  • Page Generation: 0.32 Seconds