Simulating Network Management System for Quantum Key Distribution based on rural and remote broadband in Thailand

Main Article Content

Piya TECHATEERAWAT

บทคัดย่อ

Quantum Key Distribution (QKD) is developed to improve the security network in key exchange field. There is several success network equipment in implement QKD. However, the key distribution is limited to use in point-to-point scope. In this paper, a network in quantum cryptography network is simulated based on actual Thailand broadband services that will extend the ability of number of users in present quantum cryptography network from point-to-point to multi-user network and sustain the security of the network. The developed system is implemented based on the existing quantum cryptography by managing the pairs joining of QKD system and real data of last-mile infrastructure and services of rural and remote broadband development in Thailand. The result of simulation is proven the feasibility to implement the proposed concept in real implementation.

Article Details

บท
Articles

References

Denning DE. Cryptography and Data Security. Purdue University. USA: Addison-Wesley Publisher Company; 1945.

Bennett CH, Brassard G. Quantum cryptography. Public key distribution and coin tossing. Proceedings of IEEE Int. Conf. Computers, Systems, and Signal Processing; Dec 91-2, Bangalore, India; 1984. p.175-9.

Elliott C, Pearson D, Troxel G. Quantum cryptography in practice. Proceedings of ACM SIGCOMM 2003; Karlsruhe. Germany. Aug. 2003:227-38.

Norbert L. Quantum key distribution, Institute for Quantum Computing University of Waterloo:1-10.

Zhang T, Zheng-Fu H, Xiao-Fan M, Guang-Can-G. Extensible router for multi-user quantum key distribution network. arXiv:quant-ph/0608238 2006;1-3.

Heisenberg W. Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik. Zeitschrift für Physik 1927;43:172-98.

Eli B, Shamir A. Differential cryptanalysis of the data encryption standard. Springer Verlag; 1993.

Ferguson N, Schroeppel R, Whiting D. A simple algebraic representation of Rijndael. Proceedings of Selected Areas in Cryptography. Lecture Notes in Computer Science. Springer-Verlag. 2001:103-11. Simple algebraic representation of Rijndael. In Selected areas in cryptography SAC 01, LNCS 2259 (pp. 103-111)

Bennet H, Brassard G. Quantum cryptography using any two non-orthogonal states. Phys Rev Lett 1992;68:3121-4.

Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum crytography. Rev Mod Phys. 2002;74:145-95

Steenstrup E. Routing in communications networks. Englewood. United State: Prentice Hall; 1995.

Hollifield A, Donnermeyer F. Creating demand: Influencing information technology diffusion in rural communities. Gov Inf Q 2003;20:135-50.

Kanungo T, Mount M, Netanyahu S, Piatko D, Silverman R, Wu Y. An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal Mach Intell 2002;24:881-92.