Share:


Modern quantum technologies of information security against cyber‐terrorist attacks

    Oleksandr Korchenko Affiliation
    ; Yevhen Vasiliu Affiliation
    ; Sergiy Gnatyuk Affiliation

Abstract

In this paper, the systematisation and classification of modern quantum technologies of information security against cyber‐terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is considered. In particular, a short review of existing commercial systems of quantum key distribution is given.


Santrauka


Šiame darbe susistemintos ir suklasifikuotos informacijos sauguma užtikrinančios moderniosios kvantines technologijos, skirtos apsisaugoti nuo kompiuteriu teroristu ataku. Remiantis kvantinemis technologijomis, aprašyta pagrindiniu kvantines kriptografijos krypčiu charakteristika. Pateikti konkrečiu kvantiniu protokolu kokybines analizes privalumai ir trūkumai. Taip pat aptartas telekomunikaciniuose tinkluose naudojamos dabartines kvantines kriptografijos problemos statusas. Pateikta trumpa kvantiniu raktu pasiskirstymo dabartinese komercinese sistemose apžvalga.


First Publish Online: 09 Jun 2011


Reikšminiai žodžiai: informacijos saugumas, kvantines technologijos, kvantiniu raktu pasiskirstymas, kvantiniu pagrindu apsaugotas tiesioginis ryšys, slaptas kvantu paskirstymas, kvantinio srauto šifras, kvantais užkoduotas skaitmeninis parašas, kvantine steganografija

Keyword : information security, quantum technologies, quantum key distribution, quantum secure direct communication, quantum secret sharing, quantum stream cipher, quantum digital signature, quantum steganography

How to Cite
[1]
Korchenko, O., Vasiliu, Y. and Gnatyuk, S. 2010. Modern quantum technologies of information security against cyber‐terrorist attacks. Aviation. 14, 2 (Jun. 2010), 58-69. DOI:https://doi.org/10.3846/aviation.2010.10.
Published in Issue
Jun 30, 2010
Abstract Views
241
PDF Downloads
108
Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.