Applications of Quantum Key Distribution to security protocols
Orazio Lucio Terranova
Applications of Quantum Key Distribution to security protocols.
Rel. Antonio Lioy, Ignazio Pedone. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2021
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (5MB) | Preview |
|
|
Archive (ZIP) (Documenti_allegati)
- Altro
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (16MB) |
Abstract
Every year, researches and achievements on quantum computing are making more feasible a future where quantum networks and computers will be an important part of any informative systems. Today building a quantum computer is still a challenging task, then investing in these devices is still out of the scope of many businesses. Anyway, even their possible existence bring cybersecurity engineers to ask themselves how high is the threat that they represent for current security protocols. Indeed, quantum computers can crack cryptographic algorithms way faster than standard ones. There are two main proposed solutions: to exploit new versions of modern protocols, enhancing their security properties, called post-quantum security; or to leverage quantum computing, using the Quantum Key Distribution (QKD) protocol.
The first objective was to integrate this latter protocol as-a-service (QKDaaS) in a distributed infrastructure
Relatori
Tipo di pubblicazione
URI
![]() |
Modifica (riservato agli operatori) |
