Article

Kuantum Kriptografi ve Anahtar Dağıtım Protokolleri

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Kuantum rastgele sayı üreteçleri tek gerçek rastgelelik üreteçlerdir. Klasik fiziğin aksine, kuantum fiziği tamamen rastgeledir ( Bennet, Brassard, 1984;Dereli, 2009:54-57;Gedik, 2009;;Gümüş, 2011;Kalem, 2013;Scarani, vd. 2009). ...
Article
In recent years, with the increase in the widespread use of the internet, the usage areas and the number of users have increased rapidly. Technological advances and efforts to make life easier bring innovation and transformation in many sectors. One of these innovative approaches is the use of Internet of Things (IoT) in home systems. The concept of IoT refers to the ability of objects to communicate with each other over the internet. Smart home systems stand out as systems where different devices come together work in interaction and can be controlled remotely. While this communication and integration offers various advantages, it also brings security risks. Ensuring security in IoT systems basically includes objectives such as confidentiality, integrity, and authentication. In this study, how the key used in the encryption of data transmitted between the gateway and the cloud in smart home systems can be strengthened with the B92 Quantum Key Distribution protocol is implemented through a scenario. The effect of the Quantum Key Distribution protocol in providing privacy and its advantages against man-in-the-middle attacks are emphasized in this study.
Article
An abstract is not available.
Article
An encryption method is presented with the novel property that publicly re- vealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. 2. A message can be \signed" using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed en- cryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in \electronic mail" and \electronic funds transfer" systems. A message is encrypted by representing it as a number M, raising M to a publicly specied
Article
Storing and retrieving a quantum state of light on demand, without corrupting the information it carries, is an important challenge in the field of quantum information processing. Classical measurement and reconstruction strategies for storing light must necessarily destroy quantum information as a consequence of the Heisenberg uncertainty principle. There has been significant effort directed towards the development of devices-so-called quantum memories-capable of avoiding this penalty. So far, successful demonstrations of non-classical storage and on-demand recall have used atomic vapours and have been limited to low efficiencies, of less than 17 per cent, using weak quantum states with an average photon number of around one. Here we report a low-noise, highly efficient (up to 69 per cent) quantum memory for light that uses a solid-state medium. The device allows the storage and recall of light more faithfully than is possible using a classical memory, for weak coherent states at the single-photon level through to bright states of up to 500 photons. For input coherent states containing on average 30 photons or fewer, the performance exceeded the no-cloning limit. This guaranteed that more information about the inputs was retrieved from the memory than was left behind or destroyed, a feature that will provide security in communications applications.
Article
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.
Article
a cryptographic key, enabling Alice to scramble hermessages in a way only Bob, knowing the same key, could unscramble. Privacy thusappeared to be generally unavailable to users lacking the means and foresight by whichdiplomats and spies share secret keys with their intended correspondents. Classicalcryptography offered no purely mathematical solution to this "key distribution problem". Meanwhile the only solution to the discreet communications problem appearedto be for Alice and Bob to...