Open Access
Soliton modeling of public key algorithm security
Author(s) -
Chan Myae Hein,
T. F. Kamalov
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1560/1/012007
Subject(s) - bb84 , quantum key distribution , quantum cryptography , computer science , quantum entanglement , theoretical computer science , probabilistic logic , cryptographic protocol , cryptography , quantum , computer security , quantum mechanics , physics , quantum information , artificial intelligence
Quantum key distribution protocols and problems of their protection were studied with the soliton model of entangled photons. There were estimated mutual influences between legitimate users and for any types of cracker attack. For example, BB84 protocol is shown to be unconditional security protocols using photon polarization between outlying channels. Secret keys share quantum state between spatially separated (removed or remote) legitimate users. A simple method of generating a dichotomy signal has also been accomplished. In fact, this method can open the way of probabilistic quantum states. We argue that quantum cryptographic systems can be partially simulated on a classical computer with entangled soliton model. The quantum entanglement is a basic tool of communication and processing of the information.