Quantum Cryptography Project Help.

mumaga
Messages
16
Reaction score
0
Hello Every one!

I am an electric engineering student, Doing my graduation project on the topic of quantum cryptography, i have read the literature and i think that i understand the topic quite well. In the literature review i am talking about classical cryptography, QKD, BB84 protocol, EPR protocol, a summary of implementations and the future of the technology. But i need to include analysis of some sort or a case study kinda thing. the problem is that i have no idea what to include. been searching for simulations in the web, and couldn't get my hands on anything. hardware wise of course it would be impossible. Any ideas, thoughts or help would be appreciated. i have no problem to go into the subject of satellite technology or networking.

Thank you for taking the time to read this :)

Kind regards
 
Physics news on Phys.org
if you've talking about Quantum physics, post this on the Quantum Physics section.
 
Quantum cryptopgraphy Project Help!

Hello Every one!

I am an electric engineering student, Doing my graduation project on the topic of quantum cryptography, i have read the literature and i think that i understand the topic quite well. In the literature review i am talking about classical cryptography, QKD, BB84 protocol, EPR protocol, a summary of implementations and the future of the technology. But i need to include analysis of some sort or a case study kinda thing. the problem is that i have no idea what to include. been searching for simulations in the web, and couldn't get my hands on anything. hardware wise of course it would be impossible. Any ideas, thoughts or insights would be appreciated. i have no problem to go into the subject of satellite technology or networking.

Thank you for taking the time to read this :)
 
Jadaav said:
if you've talking about Quantum physics, post this on the Quantum Physics section.

thanks Jadaav!
 


fss said:
You already asked this.

https://www.physicsforums.com/showthread.php?t=452734

What exactly are you asking? If you have to do a "graduation project" and claim to "understand the topic quite well", you should be able to do this on your own.

Well, if you haven't read the question, that already 'posted twice' i asked for help! that is why i made the post. can't fathom why would you go into all that ''if you claim then do it your own'' and what not. just don't reply!
 


mumaga said:
Well, if you haven't read the question, that already 'posted twice' i asked for help! that is why i made the post. can't fathom why would you go into all that ''if you claim then do it your own'' and what not. just don't reply!

That's not how things work here on the PF.

First, if you want a thread moved, please click the Report button and ask the Mentors to move the thread. Multiple-posting the same question is against the PF Rules that you agreed to when signing up here (see the link at the top of the page).

Second, when the question involves a school project, we expect some effort on the part of the student. That's all that fss is pointing out.

I've merged your two threads, and hopefully this thread can progress normally now.
 
mumaga said:
But i need to include analysis of some sort or a case study kinda thing. the problem is that i have no idea what to include. been searching for simulations in the web

I could help you, but you have to elaborate upon what exactly do you seek. Words like 'case study' sound as if this project had some MBAs involved in it :-p. Well, maybe you can try giving an analogy from some different (technical) field?
As for 'analysis', what do you want to analyze (or simulate)? Could it be for example, the practical implementation/security aspects of a specific QKD protocol? Or should it be something on a rather global level?
A burning & relevant topic in QKD is the `quantum hacking' activity on commercial quantum cryptosystems. An easy simulation that you could perform is the photo-number-splitting attack: how it affects the security of a standard BB84 protocol implementation (using weak coherent pulses). But then again, I am not sure if it is challenging/novel and fits within the scope of your project?
 


berkeman said:
That's not how things work here on the PF.



I've merged your two threads, and hopefully this thread can progress normally now.

I apologize for the multiple posting. It is my mistake that i haven't noticed that policy, i signed up 2 years ago, so...u get the picture...

Thanks for merging the two threads, really appreciate it... :)
 
  • #10
nitin.jain said:
. Well, maybe you can try giving an analogy from some different (technical) field?

the 'case study' term might look fancy :) , but it is what we use in our department regardless of the complexity. what i meant by is, for example make taking a pre-existing network that uses classical cryptography for security, and install the commercial QKD system into it, then re-calculate the new bit rate, the needed equipment and basically all the new additions and differences from the old network. for this case i am not sure where to start and where to find the needed information/calculations. i just found one paper :

http://www.itseurope.org/ITS%20CONF/istanbul2007/downloads/paper/15.07.2007_Sfaxi.pdf
that explains how to incorporate QKD into PPP and how to increase the security of e-commerce systems.


As for 'analysis', what do you want to analyze (or simulate)? Could it be for example, the practical implementation/security aspects of a specific QKD protocol? Or should it be something on a rather global level?

simulating the BB84 or the Eckert protocol is a possibility that i am considering. Alice, Bob and Eve are taken to be laptops, and a software to do the work of the photon's preparation and measurement. it would be the last resolution i think.

A burning & relevant topic in QKD is the `quantum hacking' activity on commercial quantum cryptosystems. An easy simulation that you could perform is the photo-number-splitting attack: how it affects the security of a standard BB84 protocol implementation (using weak coherent pulses). But then again, I am not sure if it is challenging/novel and fits within the scope of your project?

I want to present the subject as a new solution to the security problems. it is for my electric engineering degree, so it is more desirable to get into the communications details and the systems specifications more.

thank you for your time. and sorry for any headaches caused by lack of coherency or un-clarity...
 
Last edited by a moderator:

Similar threads

Replies
1
Views
1K
Replies
1
Views
2K
Replies
8
Views
1K
Replies
7
Views
2K
Replies
3
Views
3K
Replies
4
Views
2K
Replies
5
Views
6K
Back
Top