光通信物理层安全中量子噪声流加密 下载: 1660次
Quantum Noise Stream Cipher of Optical Communication in Physical Layer Security
1 国家电网甘肃省电力公司信息通信分公司, 兰州 甘肃 730000
2 北京邮电大学信息光子学与光通信国家重点实验室, 北京 100876
图 & 表
图 1. Y-00加解密配置图
Fig. 1. Diagram of Y-00 encryption and decryption configuration
下载图片 查看原文
图 2. Y-00密钥生成过程
Fig. 2. Y-00 key generation process
下载图片 查看原文
图 3. Y-00加密过程
Fig. 3. Y-00 encryption process
下载图片 查看原文
图 4. QNSC的关键技术
Fig. 4. Key technique of QNSC
下载图片 查看原文
图 5. ISK/QNSC原理图
Fig. 5. Schematic of ISK/QNSC principle
下载图片 查看原文
图 6. 两种技术的原理图。(a) PSK/QNSC; (b) QAM/QNSC
Fig. 6. Principle schematic of two technologies. (a) PSK/QNSC; (b) QAM/QNSC
下载图片 查看原文
图 7. 内生安全光通信系统理论模型
Fig. 7. Theoretical model of endogenously secure optical communication system
下载图片 查看原文
图 8. 内生安全光通信研究进展
Fig. 8. Research progress of endogenously secure optical communication
下载图片 查看原文
图 9. 安全传输密钥协商联合系统实物图
Fig. 9. Physical diagram of secure transmission and key negotiation joint system
下载图片 查看原文
图 10. 实验结果。(a)输入信号功率对Q因子的影响结果;(b)输入信号功率对误码率的影响结果;(c)信息截获概率与距离的关系;(d)通信方密钥一致性测试结果
Fig. 10. Results of the experiment. (a) Effect of input signal power on Q factor; (b) effect of input signal power on BER; (c) relationship between the probability of information interception and distance; (d) key consistency test results of communication parties
下载图片 查看原文
表 1BB84类型协议与Y-00对比[3]
Table1. Comparison between BB84-TYPE and Y-00[3]
Comparison content | BB84-TYPE | Y-00 |
---|
Purpose | Key generation | Currently data encryption(can be used for key generation) | Means of advantage creation | Intrusion-level detection | Asymmetric optimal measurement | Intrusion detection | Precise intrusion-level estimation needed to bound information leak | Not needed but can be implemented to increase security/data rate | Use of pre-shared key | Not required by design(needed for authentication to avoid MIM) | Essential for encryption | Man-in-the-middle(MIM) attack | Prone to | Not prone to(due to the use of pre-shared key) | Mean number of photons | ~0.1(non continuous variable-QKD) | ≫1(10--1000 and above) | Maximum data rate reported | ~1Mbit/s | >10Gbit/s | Detector technology | Single-photon detector | Conventional photo-detector | Long distance application | Quantum repeater | Conventional optical amplification |
|
查看原文
表 2运行密钥随机性检测结果
Table2. Running key randomness test result
Test item | Pseudo randomnumber generator | Test item | Pseudo randomnumber generator |
---|
Frequency | 0.735678 | Linear complexity | 0.292823 | Block frequency | 0.875266 | Sequence | 0.903806 | Run | 0.225167 | 0.623760 | Intra-block longest run | 0.665906 | Approximate entropy | 0.525363 | Rank of binary matrix | 0.197381 | Accumulation | 0.540815 | Discrete Fourier transform | 0.978059 | 0.847687 | Non-overlapping module matching | >0.01117 | Random walk | >0.010981 | Overlapping module matching | 0.196138 | Random walk state frequency | >0.152266 | General statistics of Maurer | 0.948782 | Linear complexity | 0.292823 |
|
查看原文
马乐, 张杰, 王博, 雷超, 李亚杰, 曲倩, 肖博, 王瑜曈, 袁平亮. 光通信物理层安全中量子噪声流加密[J]. 激光与光电子学进展, 2020, 57(23): 230603. Le Ma, Jie Zhang, Bo Wang, Chao Lei, Yajie Li, Qian Qu, Bo Xiao, Yutong Wang, Pingliang Yuan. Quantum Noise Stream Cipher of Optical Communication in Physical Layer Security[J]. Laser & Optoelectronics Progress, 2020, 57(23): 230603.