EconPapers    
Economics at your fingertips  
 

Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model

Ryan D Engle, Logan O Mailloux, Michael R Grimaila, Douglas D Hodson, Colin V McLaughlin and Gerald Baumgartner

The Journal of Defense Modeling and Simulation, 2019, vol. 16, issue 1, 27-44

Abstract: Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems.

Keywords: Quantum Key Distribution; decoy state protocol; photon number splitting attack (search for similar items in EconPapers)
Date: 2019
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
https://journals.sagepub.com/doi/10.1177/1548512917698053 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:sae:joudef:v:16:y:2019:i:1:p:27-44

DOI: 10.1177/1548512917698053

Access Statistics for this article

More articles in The Journal of Defense Modeling and Simulation
Bibliographic data for series maintained by SAGE Publications ().

 
Page updated 2025-03-19
Handle: RePEc:sae:joudef:v:16:y:2019:i:1:p:27-44