請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/26002完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 郭斯彥 | |
| dc.contributor.author | Tsung-Han Wu | en |
| dc.contributor.author | 吳宗翰 | zh_TW |
| dc.date.accessioned | 2021-06-08T06:58:19Z | - |
| dc.date.copyright | 2009-07-14 | |
| dc.date.issued | 2008 | |
| dc.date.submitted | 2009-07-07 | |
| dc.identifier.citation | [1] C. H. Bennet and G. Brassard, “Quantum Cryptography: Public key distribution and coin tossing”, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175 (1984)
[2] id Quantique website: http://www.idquantique.com [3] Clavis Specifications sheet, http://www.idquantique.com/products/files/clavis-specs.pdf [4] V. Scarani, A. Acin, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett., Vol. 92, 057901, 2004. [5] Quantum Information Networks Projects of NIST, http://w3.antd.nist.gov/qin/index.shtml [6] MagiQ Technologies, Inc. website: http://www.magiqtech.com [7] SmartQuantum website: http://www.smartquantum.com [8] C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized privacy amplification, ” IEEE Trans. on Information Theory, vol. IT-41, pp. 1915–1923., 1995 [9] D. Deutsch, A. K. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, and A. Sanpera, “Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels,” Phys. Rev. Lett., vol. 77, pp. 2818-2821, 1996. [10] H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett., vol. 94, 230504, 2005 [11] C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett., Vol. 68, No. 21, pp. 3121–2124, 1992 [12] C. H. Bennett, G. Brassard, and N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett., vol. 68, pp. 557-559, 1992. [13] A. K. Ekert, “Quantum Cryptography based on Bell's Theorem,” Phys. Rev. Lett., Vol. 67, No. 6, pp. 661-663, 1991 [14] T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger, “Quantum cryptography with entangled photons,” Phys. Rev. Lett., vol. 84, pp. 4729-4732, 2000. [15] “Quantum cryptography protocol” , New Journal of Physics 8 193 (2006). [16] Johannes A. Buchmann, INTRODUCTION TO CRYPTOGRAPHY. Springer, 2000. [17] Giuliano Beneti, Giulio Casati, and Giuliano Strini, “Principle of Quantum Computation and Informaiton”, World Scientific, 2004. [18] Michael A, Nielsen, and Isaac L. Chuang, “Quantum Computation and Quantum Information”, CAMBRIDGE UNIVERSITY PRESS, 2000. [19] “Quantum Key Distribution System id 3100 Clavis2 User Guide”, id Quantique, Mar 2008. [20] “White Paper: Raw Key Exchange using QKD development Kit for id3100”, version 1.0, id Quantique, Feb 2009. [21] O. Sami Saydjari, “Quantum Cryptography”, IEEE SECURITY & PRIVACY, 2004. [22] Romain Alleaume, SECOQC White Paper on Quantum Key Distribution and Cryptography, SECOQC, Jan 2007. [23] http://tetralet.luna.com.tw/index.php?op=ViewArticle&articleId=188&blogId=1 [24] http://job.achi.idv.tw/2008/02/18/gtk-20-tutorial/ [25] http://blog.linux.org.tw/~jserv/archives/002049.html [26] http://support.oss.org.tw/wiki/index.php/Gtk_range_widget [27] http://library.gnome.org/devel/gtk-tutorial/stable/ [28] http://zetcode.com/tutorials/gtktutorial/ [29] http://zetcode.com/tutorials/gtktutorial/chinese/ [30] http://library.gnome.org/devel/gtk-faq/stable/ [31] http://library.gnome.org/devel/gtk/stable/ [32] http://www.gtk.org/download-linux.html [33] http://www.gtkforums.com/index.php [34] Andrew Krause, Foundations of GTK+ Development, Apress, 2007 [35] Roger Leigh, An introduction to programming with GTK+ and Glade in ISO C, ISO C++ and Python Version 1.3.1, 20th July 2006. [36] http://www.prasannatech.net/2008/07/socket-programming-tutorial.html [37] Warren W. Gay, Linux Socket Programming by example, Macmillan Computer Publishing. [38] W. Richard Stevens, 林慶德 譯, 網路應用程式投計介面Sockets與XTI, PEASON Education Taiwan, 2002. [39] http://en.kioskea.net/contents/crypto/cleprivee.php3 [40] http://publiespe.espe.edu.ec/articulos/sistemas/seguridadweb/seguridadweb.htm [41] http://en.wikipedia.org/wiki/One-time_pad [42] http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213673,00.html [43] http://www.cypherspace.org/adam/rsa/otp.html [44] http://users.telenet.be/d.rijmenants/en/onetimepad.htm [45] Claude Shannon's 'Communication Theory of Secrecy Systems' [46] http://en.wikipedia.org/wiki/Key_distribution [47] http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange [48] http://www.quantiki.org/wiki/index.php/The_no-cloning_theorem [49] http://highscope.ch.ntu.edu.tw/?p=1640 | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/26002 | - |
| dc.description.abstract | 本研究擬實現BB84協定,證明量子金耀分配(Quantum Key Distribution, QKD)系統的可行性,以供未來後續研究發展之基礎。BB84協定是在1984年由C. H. Bennett和G. Brassard所提出,是第一個量子加密方案。它可以讓傳送端及接收端取得一個只有雙方知道的一組密碼本,任何竊聽者的存在都會被發現,從而保證密碼本的絕對安全。
實作方法將使用id Quantique公司的研究型量子加密系統id3100 Clavis2為平台,來做量子通信網路及加密技術之研究,研究成果將可做為未來自行發展量子密碼系統或改良現有量子加密系統之基礎,也可提供量子加密技術商品化的測試平台。 廠商提供之QKD development必須安裝在Linux的作業系統下,以對QKD-Alice及QKD-Bob進行控制。(Linux作業系統是Ubuntu版本)而原廠所附之簡易QKD-Menu操作介面是以文字的方式呈現。然而,圖形化的控制介面具操作上的便利性及直覺性,故開發GUI的控制程式為本計畫之重要工作。另外,為表現量子金鑰分配系統在實際應用上的成果,藉由GUI程式來進行幾種常用之通訊應用結合量子加密技術的展示,更能讓人了解量子金鑰分配系統的運用範疇及其強大的加密功能。 | zh_TW |
| dc.description.abstract | Our research wants to implement the BB84 protocol to improve the feasibility of the Quantum Key Distribution System. It will be the fundamental prototype for the future research. BB84 is proposed by C. H. Bennett and G. Brasard in 1984 and is the first quantum cryptography algorithm. It can exchange a password between the sender and the receiver. Any eavesdroppers will be discovered and it can ensure the security of the communication.
We will use the quantum key distribution system for research called id 3100 Clavis2 provided by id Quantique to implement the BB84 protocol. We use the machine to do some research about network and cryptography, and the achievements will be the fundamental of developing our own quantum cryptography system. The QKD development must be installed under the Linux Operating System and used to control QKD-Alice and QKD-Bob (The distribution of Linux OS is Ubuntu). However, the original QKD menu is presented by text line, so developing the graphical user interface is also the important process we should make effort. Besides, in order to demonstrate the QKDS on practical applications, we use the GUI program to combine some common network applications. It will exhibit the powerful function of QKDS. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-08T06:58:19Z (GMT). No. of bitstreams: 1 ntu-97-R95943157-1.pdf: 1898932 bytes, checksum: ab56ca434f08f87c1ade292df727bf8c (MD5) Previous issue date: 2008 | en |
| dc.description.tableofcontents | 口試委員會審定書 i
誌謝 ii 中文摘要 iii CONTENTS v LIST OF FIGURES viii LIST OF TABLES x Chapter 1 Introduction 1 1.1 Cryptography 2 1.2 Quantum Mechanics 3 1.3 Quantum Cryptography 5 Chapter 2 Preliminaries 7 2.1 Private key cryptography 7 2.2 Public key cryptography 9 2.3 One-time Pad 10 2.4 Key Distribution Problem 13 2.4.1 Discrete Logarithm 13 2.4.2 Diffie and Hellman Key Distribution 14 2.5 The no-cloning Theorem 16 2.6 Quantum Key Distribution 16 2.6.1 BB84 protocol 18 2.6.2 SARG protocol 20 2.7 Quantum Key Distribution System 20 2.7.1 id-3100 Quantum Key Distribution System (QKDS) 21 2.7.2 Optical System of QKDS-A 22 2.7.3 Optical System of QKDS-B 24 2.8 GTK+ 25 Chapter 3 Algorithm 27 3.1 Control algorithm for the QKDS id3100 Clavis2 27 3.1.1 Bob Main Sequence 28 3.1.2 Alice Main Sequence 30 3.2 Algorithm for the QKD simulation program 30 3.2.1 Flow of Bob 30 3.2.2 Flow of Bob’s RKE Thread 31 3.2.3 Flow of Bob’s Application Thread 33 3.2.4 Flow of Alice 33 3.2.5 Flow of Alice’s RKE Thread 33 3.2.6 Flow of Alice’s Application Thread 35 3.2.7 Raw Key Sift on BB84 and SARG 38 3.2.8 Error Correction 40 3.2.9 Privacy Amplification 40 3.3 Interpretation for the GUI application programs 42 3.3.1 Widgets 42 3.3.2 Signals and Callbacks 43 3.3.3 Packing 44 Chapter 4 Results 46 4.1 Control Programs for the QKDS id 3100 Clavis2 46 4.1.1 Load Firmware and FPGA configuration of Bob 46 4.1.2 Check Detector Temperature of Bob 47 4.1.3 Get Status of Bob 47 4.1.4 Get Losses and Efficiencies of Bob 48 4.1.5 Laser Measurement of Bob 49 4.1.6 Noise Measurement of Bob 52 4.1.7 Line Measurement of Bob 53 4.1.8 Raw Key Exchange of Bob 57 4.1.9 Get Status for Alice 61 4.1.10 Get EEPROM for Alice 62 4.1.11 Line Length Measurement for Alice 62 4.1.12 Raw Key Exchange for Alice 63 4.2 QKD Simulation Programs 66 4.3 GUI Application Programs 67 4.3.1 The Main Page and the QKDS Measurement Page 67 4.3.2 The Application Pages and the Connect Dialog 67 4.3.3 The Setting Dialog 69 4.3.4 The About Dialog and the Exit Dialog 70 Chapter 5 Conclusion and Future Work 71 Bibliography …………………………………………………………………………..72 | |
| dc.language.iso | en | |
| dc.title | BB84及SARG通訊協定於量子金鑰分配系統之實現 | zh_TW |
| dc.title | Implementation of BB84 and SARG Protocol on
Quantum Key Distribution System | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 97-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 雷欽隆,袁世一,呂學坤,蔡一鳴 | |
| dc.subject.keyword | 量子,密碼學,通訊協定,實作, | zh_TW |
| dc.subject.keyword | Quantum,Cryptography,BB84,SARG,QKDS,Implement, | en |
| dc.relation.page | 75 | |
| dc.rights.note | 未授權 | |
| dc.date.accepted | 2009-07-08 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電子工程學研究所 | zh_TW |
| 顯示於系所單位: | 電子工程學研究所 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-97-1.pdf 未授權公開取用 | 1.85 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
