A Three-stage Phase Encoding Technique for Quantum Key Distribution

Size: px
Start display at page:

Download "A Three-stage Phase Encoding Technique for Quantum Key Distribution"

Transcription

1 A Three-stage Phase Encoding Technique for Quantum Key Distribution F. Zamani, S. Mandal, and P. K.Verma School of Electrical and Computer Engineering, University of Oklahoma, Tulsa, Oklahoma, USA Abstract - The only known transmission technique that provides unconditional security is based on quantum cryptography. The current workhorse of quantum cryptography, more precisely, quantum key distribution (QKD), is based on the BB 84 protocol. Most commercial QKD implementations are based on phase-coding the BB 84 protocol, where the unbalanced Mach-Zehnder Interferometer (UMZI) is used as the information coder and decoder. This paper presents a three-stage phase encoding quantum key distribution protocol which is based only on one two-way quantum channel. This protocol does not need key sifting for key establishment. The proposed technique thus obviates the use of a classical communication channel for key sifting and key distillation which are subject to eavesdropping. The proposed technique thus increases the key efficiency and security compared with the current techniques. Keywords: Quantum key distribution (QKD); sifted key; key reconciliation; Phase coding protocol; Plug and play system 1 Introduction The aim of cryptography is to prevent a cryptanalyst from deciphering information sent by one party to another party. In classical cryptography, the process of encryption and decryption of information is based on mathematical algorithms and the security of the classical cryptography is based on the difficulty of these algorithms. Quantum cryptography is a good solution for providing key distribution. Quantum key distribution (QKD) applies the quantum mechanics concept to guarantee security of a key exchange between two legitimate parties in the presence of cryptanalyst [1, 2, 3, 4]. According to the Heisenberg uncertainty principle and no-cloning theorem, measuring or copying the quantum state of the qubit alters the original information in the qubit [5]. In quantum key distribution, we are able to detect whether the eavesdropper has eavesdropped on the message or not, while the classical cryptography does not offer this feature. The BB 84 is the most commonly used quantum key distribution protocol proposed by Bennett and Brassard in 1984 [5, 6]. It utilizes one quantum channel and one two-way classical channel. The classical channel is a regular telecommunication channel, over which Alice and Bob exchange information. The aim is establishing a secret key between two authorized parties, Alice and Bob, with the possibility that Eve can be present during the key establishment process. The original proposal of BB 84 relies on the polarization encoding of a photon. Since the alignment and the stabilization of polarization axes between Alice and Bob is practically difficult and depolarization happens due to medium transmission changes, the phase-coding technique for implementing BB 84 is used. Called the Plug and Play protocol, it is one of the common implementations of BB 84. The Plug and Play system utilizes one two-way quantum channel and one two-way classical channel which is basically an Ethernet channel. This classical channel is used for key sifting and key distillation. In this paper we propose a three stage QKD protocol which uses a single two-way quantum channel, thus removing the need for depending on a classical channel. The proposed mechanism will increase the security and key efficiency of the key establishment procedure and there will be no need to have the key sifting step which reduces the size of the final key. The rest of the paper is organized as follows: the phase coding BB 84 protocol reviewed in Section II, Section III describes Plug and Play system, Section IV describes our proposed protocol, Section V illustrates the scenario in the presence of an eavesdropper and in Section VI the various advantages of the proposed protocol are described as compared with other phase coding protocols. Finally, in Section VII, we present our conclusions. 2 Phase coding BB 84 Protocol As mentioned earlier, the BB 84 protocol was first implemented using polarization encoding. At present, phase encoding is used because using the polarization states causes some alignment and stabilization difficulties in practice. The basic configuration of phase coding is shown in Fig. 1 [7, 11]. The sender (Alice) transmits a photon through an asymmetric Mach Zehnder interferometer. When the photon passes through the interferometer the phase difference a between the two paths is randomly chosen from one of four values, namely {0, π} and {π/2, 3π/2} by PMA (phase modulator of Alice). After sending the photon to the receiver, Bob receives the photon and then passes it through his interferometer which is identical to Alice s. The phase difference b on Bob s side is randomly chosen from {0, π/2} by PMB (phase modulator of Bob).The photon is then detected at one of the two interferometer s outputs, each of which has a detector. Using this method, a secret key is generated by the protocol which is as follows:

2 4) The linear polarization is rotated by 90 degrees in the shorter arm of the interferometer, not shown in Fig. 2. 5) Both the beams then recombine and come out one after another from Bob s side. (The first pulse passed the short and the second pulse passed the long arm of the interferometer). 6) The pulses are then transmitted to Alice through the optical fiber. Figure 1. Schematic diagram of phase coding protocol 1) A number of photons are sequentially transmitted from Alice to Bob. 2) After the completion of the transmission through the quantum channel, Bob tells Alice which phase was chosen by him to detect the photon. 3) Alice lets Bob know using the classical channel, whether she chose a from {0, π} or from {π/2, 3π/2) for the detected photon. This phase information enables Bob to know if the detection event was deterministic or probabilistic. 4) In case of deterministic detection events, Alice considers a zero (X basis) axis or π/2 (Y basis) as bit 0 and b equals π (X basis) or 3π/2 (Y basis) as bit 1, whereas, Bob considers the detector 1 click as bit 0 and the detector 2 click as bit 1. In case of probabilistic detection events, they ignore them. A bit string created in this step is the sifted key. 5) Finally, after obtaining the sifted bit string, the two parties should communicate with each other through the classical channel to apply error correction and privacy amplification to obtain the final secret key. 2.1 Plug and Play System In this section, we describe a phase coding autocompensating system which is part of the Plug and Play implementation [8, 9, 10, 11]. The structure of the phase coding auto-compensating system is as shown in Fig. 2. The steps under which the system operates are as follows: Bob s Side: 1) Laser (L) produces strongly linearly polarized pulses of photons on Bob side. 2) The beam is then separated into two equal parts at the 50/50 beam splitter (BS). 3) The long arm of the interferometer contains a delay line (DL) and the Bob s phase modulator (PMB) is not used at this step of transmission. Alice s side: 7) Pulses that reach Alice, passing the BS 10/90 (90% of the intensity will be registered in the detector DA). 8) The other output of the beam splitter which is 10% is attenuated by the variable attenuator (VA) and reflected by a Faraday Mirror (FM), where the polarization states are reversed. 9) Alice applies a phase of 0 or π (bit 0 and 1 in the X-basis) and π/2 or 3π/2 (bit 0 and 1 in the Y-basis) on the second pulse for implementing the BB 84 protocol with her phase modulator (PMA). 10) The two pulses coming out as the output from Alice s side are orthogonal to each other but they have their polarizations interchanged because they have been reflected by the Faraday Mirror (FM). Thus, a compensation of all accumulated polarizations changes can take place on the way back from Alice to Bob. Bob side: 11) Two pulses arrive at Bob s interferometer and the first pulse now enters the long arm because of the changed polarization states. 12) Bob randomly chooses the measurement basis by applying a 0 or a π/2 phase shift on the first pulse by using his phase modulator (PMB). 13) The second pulse passes the short path in the interferometer. 14) Both pulses arrive at the same time at beam splitter (BS) and interfere with each other. 15) They are detected either in the detector 1 (D1) or after passing through the circulator (C) in the detector (D2). 16) The system is a usual QKD system which is using phase encoding between coherent pulses for transmitting a key from Alice to Bob. If Bob s phase (PMB) = 0 and Alice s phase (PMA) = 0 or π, then measuring it in the X basis, one of Bob s detectors obtains a conclusive result, which thereby determines the bit to be a 0 or 1. On the other hand, when the phase of PMB is 0 and that of PMA is π/2 or 3π/2, either of the two detectors of Bob clicks with equal probability. This is because Alice chooses the Y-basis and Bob chooses the X-basis, which are different bases. A complementary process happens for PMB=π/2.

3 Figure 2. Schematic diagram of Plug and Play system, (FM: Faraday Mirror, BS: beam splitter, PBS: polarization beam splitter, PMA: Phase modulator of Alice, PMB: Phase modulator of Bob, DL: delay line, VA: variable attenuator, C: circulator, D1&D2&DA: detectors, L: laser, SL: storage line) Alice and Bob after exchanging raw keys through the quantum channel need to communicate with each other through the classical channel to sift the raw key and discard Bob s random clicks. Also, after obtaining the sifted bit string, the two parties should communicate with each other through the classical channel to apply key distillation and Privacy Amplification to obtain the final secret key. In this paper, we propose a new quantum key distribution protocol, which utilizes a two way quantum channel and does not need the two parties to communicate to get the sifted key. This three stage quantum key distribution protocol will be discussed in the next section in detail. 2.2 The Proposed Protocol As we discussed in the previous section, the Plug and Play system is based on using a classical channel for key sifting and key reconciliation. Our proposed protocol is based on encoding the qubits in a similar manner to the Plug and Play system, but we propose to use a two way quantum channel for the quantum key distribution. The idea for omitting the classical channel to sift the key comes from Kak s three stage polarization based protocol which is the only QKD protocol using three stages for key establishment [14,15]. The key establishment technique of our proposed protocol is described in Fig. 3. In the proposed protocol Alice has a bit string that she wants to share with Bob as the secret key. The key distribution procedure is achieved in the following way: 1- Strong linearly polarized pulses of photons are produced by a laser from Alice s side. The qubits are encoded in the relative phase between two subsequent pulses. 2- Alice applies an arbitrary phase of α1 to the first pulse and β1 to the second pulse and sends these two pulses through the quantum channel to Bob. 3- Bob receives these pulses and applies another arbitrary phase α2 to the first pulse and β2 to the second pulse and sends them back to Alice. It should be mentioned here that these arbitrary phases are known only to Alice and Bob respectively. 4- Alice again receives the two pulses from Bob and applies α1 to the first pulse and β1 to the second pulse for encoding bit 0. On the other hand, for encoding bit 1, Alice applies ( α1+π) and β1 to the first and second pulses respectively and sends them back to Bob. 5- Bob receives the two pulses from Alice and applies α2 and β2 to the first and second pulses. These pulses after passing through the unbalanced interferometer are finally detected either in detector 1 (bit 0 ) or detector 2 (bit 1 ) according to their phase difference (0 or π). The system structure of the proposed protocol is sketched in Fig. 4. In the proposed system, at Alice s side, a laser produces strong linearly polarized pulses of photons. The beam is then separated into two parts at the 50/50 beam splitter (BS) and enters into the unbalanced interferometer with a delay line DL in the long arm, which produces two pulses. Then with the help of the phase modulator (PMA1), Alice applies an arbitrary phase of α1 to the first pulse and β1 to the second pulse and sends these two pulses through the quantum channel to Bob. Now Bob uses his phase modulator (PMB1) to apply another arbitrary phase α2 to the first pulse and β2 to the second pulse and sends them back to Alice. Next, Alice encodes bit 0 and 1, according to the key establishment procedure described above using the phase modulator (PMA2) and sends these encoded qubits back through the quantum channel (optical fiber) to Bob. Bob receives the two pulses from Alice and applies ( α2) and ( β2) to the first and second pulses using his phase modulator (PMB2). Bob then inverts the polarizations of the pulses and sends them to the interferometer. Due to this reversal of the polarizations of the pulses, the pulses which had travelled through the shorter arms of the interferometer at Alice s side will pass through the long arm of the interferometer at Bob s side and vice versa. As a result, the two pulses will reach the beam splitter where they interfere. Then they are detected

4 either in detector 1(D1) or detector 2 (D2) according to their phase difference. Now Bob considers the detector 1 clicks as bit 0 and the detector 2 clicks as bit 1.Thus, in this way, Alice shares her identical key with Bob without the process of key sifting and hence obviating the need for a classical channel in this step. We will consider the existence of Eve in our protocol in the next section. 2.3 Impact of an Intruder One of the primary advantages of the proposed protocol is that Alice and Bob use arbitrary phases each time for the key establishment and thus an intruder Eve cannot guess the actual guess the actual phase which is applied to the pulses in each transmission. So, in this case, Eve cannot get any information from avesdropping on the channel and she can only apply some random phases and disturb the information which Bob receives. Alice α1 β 1 Bob α1 β 1 For Encoding bit 0 α1+α2- α1 β 1+β 2- β 1 α1+α2- α1 β 1+β 2- β 1 α1+α2- α1-α2 β 1+β 2- β 1-β 2 D1 For Encoding bit 1 α1+α2- α1+π β 1+β 2- β 1 Δθ = 0 α1+α2- α1+π β 1+β 2- β 1 α1+α2- α1-α2 +π β 1+β 2- β 1-β 2 Δθ = π D2 Fig.3. Schematic diagram of key establishment procedure of the proposed protocol Alice Bob LASER BS DL H V (α1,β1) PMA1 1 2 PMA2 Optical fiber (-α2,-β2) PMB2 2 1 PMB1 V H PBS DL D2 D1 For bit 0 :(-α1,-β1) For bit 1 :(-α1+π,-β1) Encoding Box (α2,β2) Figure 4. Schematic diagram of proposed protocol system, (BS: beam splitter, PBS: polarization beam splitter,pma1&pma2: Phase modulator of Alice, PMB1&PMB2 : Phase modulator of Bob, DL: delay line, C: circulator, D1&D2: detectors)

5 In the case where Eve applies some random phase to the pulses in order to disturb the information, the phase difference of the two pulses will be detected randomly by the two detectors. To overcome this vulnerability, Alice and Bob put some portion of the previous established key as a test key and send it at the first of the transmission in order to check the presence of any intruder on the channel. If any of the two parties get some error in the test key, they know that there is an intruder present and they abort the transmission. Moreover, for avoiding the man in the middle attack, Alice and Bob use this test key part for authentication and thus in this case there is no chance for Eve to attack the protocol by disguising to be the man-in-the-middle. 2.4 The Advantages of Proposed Protocol in Comparison with the Other Phase-Coding Protocols 1. Raw key efficiency is defined as the length of the raw key shared by Alice and Bob divided by the length of the random bits generated by Alice [10]. In the proposed protocol due to the usage of two-way quantum channel and three stages of transmission, the raw key efficiency of the protocol can reach 100 percent, which is twice as much as that of the other phase coding protocols [12,13], which is only 50 per cent. 2. The other phase coding protocols need both quantum channel and classical channel for raw key generation, which is basically a weak channel in the sense of security but the proposed protocol only utilizes a twoway quantum channel for raw key generation and this causes Eve s information reduction dramatically. 3. The proposed protocol is more secure according to other protocol because there is no need to transmit the phase information through the classical channel and Eve cannot get any information about the key so the privacy amplification step which is necessary for the other protocols is obviated. As a result the key establishment security and efficiency in our protocol is more than others. 4. In the proposed protocol, Alice can send the encoded key stream to Bob and because there is no key sifting in this method, an effective coding scheme based on forward error correction will reduce the probability of error in the final key to an arbitrary small value so there is no need to have classical channel for error correction. Proposed method uses a three-stage protocol. Fiberbased polarization changes are addressed through the use of phase encoding and an auto compensation technique used in the plug and play system. 5. The proposed protocol is robust against photon number splitting attack and it does not need to have single photon generator because if Eve intercept the photons cannot get any information without having the phase of pulses. 3 Conclusions This paper has presented a novel means for exchanging quantum key between two entities, Alice and Bob. The technique is based on the use of a two-way quantum channel instead of one-way quantum channel as in BB 84. The two way quantum channel is used both for exchanging the quantum key as well as for replacing the conventional key sifting and key distillation on a classical channel. The proposed method thus obviates the need for a classical channel which is an additional security threat. The two-way quantum channel uses a three-stage protocol described in this paper. 4 References [1] Lo HK, Chau HF. Unconditional security of quantum key distribution over arbitrary long distances. Science 1999; 283(5410): [2] V.L. Kurochkin, I.G. Neizvestny, Quantum Cryptography, 10th International Conference and Seminar EDM'2009, Section III, [3] V.Teja1, P. Banerjee2, N. N. Sharma3 and R. K. Mittal3, Quantum Cryptography: State-of-Art,Challenges and Future Perspectives, Proceedings of the 7th IEEE International Conference on Nanotechnology, [4] M.S. Sharbaf, Quantum Cryptography: A New Generation of Information Technology Sec urity System, Sixth International Conference on Information Technology: New Generations, [5] G. Benenti, G. Casatti, and G. Strini, Principles of Quantum computation, vol. I: Basic Concepts, World Scientific Publishing, New Jersey, [6] C. H. Bennett, and G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 10-12, 1984, pp [7] G. Massimo Palma, Quantum Cryptography, in Handbook of Information Security, Volume II, Part 3, pp , John Wiley and Sons Inc., New Jersey, [8] K.Inoue, Quantum Key Distribution Technologies, IEEE Journal of Selected Topics In Quantum Electronics, VOL. 12, NO. 4, JULY/AUGUST [9] A.muller, T. herzog, B.Huttner, W.tittle and H.zbinden, Plug and Play Systems for quantum cryptography, Appl.Phys.Lett. 70, 793(1997) 98, 102 [10] G.Ribordy, J.-D.Gautier, N. Gisin, O. Guinnard and H. Zbinden, Automated plug and play quantum key distribution, Electronics Letters, VOL.34,No.22, 1998 [11] V.Scarani, H.Bechmann-Pasquinucci, N. J. Cerf, Dusek, N.Lutkenhaus, M. Peev, The Security of Practical Quantum Key Distribution, Foundations of Physics ver.3, 2009; arxiv: quant-ph/ [12] K.Inoue, E.Waks, Y.Yamamoto, Differential-Phase Shift Quantum Key Distribution Physical Rev. Lett, Vol.89, 2002, [13] H.Takesue, T.Honjo, K.Tamaki, and Y.Tokura, Differential Phase Shift-Quantum Key Distribution IEEE Communications Magazine , 2009 [14] S. Kak, A three-stage quantum cryptography protocol. Foundations of Physics Letters 19, 293, 2006; arxiv: quant-ph/ [15] P. Basuchowdhuri, Comparing BB84 and Authentication-Aided Kak s Three-Stage Quantum Protocol,CITED AS: ARxIV:CS/ v1

Unconditionally secure quantum key distribution over 50km of satndard telecom fibre

Unconditionally secure quantum key distribution over 50km of satndard telecom fibre Unconditionally secure quantum key distribution over 50km of satndard telecom fibre C. Gobby,* Z. L. Yuan and A. J. Shields Toshiba Research Europe Ltd, Cambridge Research Laboratory, 260 Cambridge Science

More information

arxiv: v1 [quant-ph] 13 May 2010

arxiv: v1 [quant-ph] 13 May 2010 Experimental demonstration of phase-remapping attack in a practical quantum key distribution system Feihu Xu, 1, Bing Qi, 1, and Hoi-Kwong Lo 1, 1 Center for Quantum Information and Quantum Control (CQIQC),

More information

Global quantum key distribution using CubeSat-based photon sources

Global quantum key distribution using CubeSat-based photon sources Global quantum key distribution using CubeSat-based photon sources David Mitlyng S-fifteen Space Systems 1550 Larimer Street, Suite 293, Denver, CO 80202; +1-650-704-5650 david@s15.space Robert Bedington

More information

Differential-Phase-Shift Quantum Key Distribution

Differential-Phase-Shift Quantum Key Distribution Differential-Phase-Shift Quantum Key Distribution Kyo Inoue Osaka University NTT Basic Research Laboratories JST CREST Collaboration with H. Takesue, T. Honjo (NTT Basic Res. Labs.) Yamamoto group (Stanford

More information

Long-distance quantum key distribution in optical fibre

Long-distance quantum key distribution in optical fibre Long-distance quantum key distribution in optical fibre P. A. Hiskett 1, D. Rosenberg 1, C. G. Peterson 1, R. J. Hughes 1, S. Nam 2, A. E. Lita 2, A. J. Miller 3 and J. E. Nordholt 1 1 Los Alamos National

More information

High rate, long-distance quantum key distribution over 250km of ultra low loss fibres

High rate, long-distance quantum key distribution over 250km of ultra low loss fibres High rate, long-distance quantum key distribution over 250km of ultra low loss fibres D Stucki 1, N Walenta 1, F Vannel 1, R T Thew 1, N Gisin 1, H Zbinden 1,3, S Gray 2, C R Towery 2 and S Ten 2 1 : Group

More information

QKD Overview. Review of Modern Physics 74 p (2002) "Quantum cryptography by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden.

QKD Overview. Review of Modern Physics 74 p (2002) Quantum cryptography by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden. QKD Overview Review of Modern Physics 74 p 145-190 (2002) "Quantum cryptography by N. Gisin, G. Ribordy, W. Tittel, H. Zbinden. Practical issues Security of BB84 relies on single-photon qubits Single photon

More information

Random Sequences for Choosing Base States and Rotations in Quantum Cryptography

Random Sequences for Choosing Base States and Rotations in Quantum Cryptography Random Sequences for Choosing Base States and Rotations in Quantum Cryptography Sindhu Chitikela Department of Computer Science Oklahoma State University Stillwater, OK, USA sindhu.chitikela@okstate.edu

More information

Quantum Cryptography Kvantekryptering

Quantum Cryptography Kvantekryptering Lecture in "Fiberkomponenter" course, November 13, 2003 NTNU Quantum Cryptography Kvantekryptering Vadim Makarov www.vad1.com/qcr/ Classical vs. quantum information Classical information Perfect copy Unchanged

More information

QUANTUM key distribution (QKD) provides a secret key

QUANTUM key distribution (QKD) provides a secret key IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, VOL. 21, NO. 3, MAY/JUNE 2015 6600207 Differential Phase-Shift Quantum Key Distribution Systems Kyo Inoue (Invited Paper) Abstract Differential phase-shift

More information

arxiv:quant-ph/ v1 22 Jul 1999

arxiv:quant-ph/ v1 22 Jul 1999 Continuous Variable Quantum Cryptography T.C.Ralph Department of Physics, Faculty of Science, The Australian National University, ACT 0200 Australia Fax: +61 6 249 0741 Telephone: +61 6 249 4105 E-mail:

More information

Quantum key distribution system clocked at 2 GHz

Quantum key distribution system clocked at 2 GHz Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S. Buller School of Engineering and Physical Sciences, Heriot-Watt University, Edinburgh, UK, EH14 4AS k.j.gordon@hw.ac.uk

More information

arxiv: v2 [quant-ph] 16 Jul 2018

arxiv: v2 [quant-ph] 16 Jul 2018 High speed error correction for continuous-variable quantum key distribution with multi-edge type LDPC code Xiangyu Wang 1, Yichen Zhang 1,, Song Yu 1,*, and Hong Guo 2 arxiv:1711.01783v2 [quant-ph] 16

More information

Implementation of an attack scheme on a practical QKD system

Implementation of an attack scheme on a practical QKD system Implementation of an attack scheme on a practical QKD system Q. Liu, I. Gerhardt A. Lamas-Linares, V. Makarov, C. Kurtsiefer Q56.5 - DPG Tagung Hannover, 12. March 2010 Overview Our BBM92 QKD implementation

More information

Polarization recovery and auto-compensation in Quantum Key Distribution network 1

Polarization recovery and auto-compensation in Quantum Key Distribution network 1 Polarization recovery and auto-compensation in Quantum Key Distribution network 1 Lijun Ma a, Hai Xu a,b, Xiao Tang a a National Institute of Standards and Technology, 1 Bureau Dr., Gaithersburg, MD 2899

More information

Low loss QKD optical scheme for fast polarization encoding

Low loss QKD optical scheme for fast polarization encoding Low loss QKD optical scheme for fast polarization encoding A. Duplinskiy,,*, V. Ustimchik,3, A. Kanapin,4, V. Kurochkin and Y. Kurochkin Russian Quantum Center (RQC), Business Center «Ural», 00, Novaya

More information

arxiv: v1 [quant-ph] 6 Oct 2009

arxiv: v1 [quant-ph] 6 Oct 2009 A 24 km fiber-based discretely signaled continuous variable quantum key distribution system arxiv:0910.1042v1 [quant-ph] 6 Oct 2009 Quyen Dinh Xuan 1, Zheshen Zhang 1,2, and Paul L. Voss 1,2 1. Georgia

More information

Quantum key distribution with 1.25 Gbps clock synchronization

Quantum key distribution with 1.25 Gbps clock synchronization Quantum key distribution with 1.25 Gbps clock synchronization J. C. Bienfang, A. J. Gross, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, R. Lu, D. H. Su, Charles W. Clark, Carl J. Williams National Institute

More information

Quantum key distribution system clocked at 2 GHz

Quantum key distribution system clocked at 2 GHz Quantum key distribution system clocked at 2 GHz Karen J. Gordon, Veronica Fernandez, Gerald S. Buller School of Engineering and Physical Sciences, Heriot-Watt University, Edinburgh, UK, EH14 4AS k.j.gordon@hw.ac.uk

More information

High speed coherent one-way quantum key distribution prototype

High speed coherent one-way quantum key distribution prototype High speed coherent one-way quantum key distribution prototype Damien Stucki 1, Claudio Barreiro 1, Sylvain Fasel 1, Jean-Daniel Gautier 1, Olivier Gay 2, Nicolas Gisin 1, Rob Thew 1, Yann Thoma 1, Patrick

More information

Towards practical quantum cryptography

Towards practical quantum cryptography Appl. Phys. B 69, 389 393 (1999) / Digital Object Identifier (DOI) 10.1007/s003409900166 Applied Physics B Lasers and Optics Springer-Verlag 1999 Towards practical quantum cryptography S. Chiangga 1,2,P.Zarda

More information

Countermeasure against tailored bright illumination attack for DPS-QKD

Countermeasure against tailored bright illumination attack for DPS-QKD Countermeasure against tailored bright illumination attack for DPS-QKD Toshimori Honjo, 1,* Mikio Fujiwara, Kaoru Shimizu, 3 Kiyoshi Tamaki, 3 Shigehito Miki, Taro Yamashita, Hirotaka Terai, Zhen Wang,

More information

COHERENT DETECTION OPTICAL OFDM SYSTEM

COHERENT DETECTION OPTICAL OFDM SYSTEM 342 COHERENT DETECTION OPTICAL OFDM SYSTEM Puneet Mittal, Nitesh Singh Chauhan, Anand Gaurav B.Tech student, Electronics and Communication Engineering, VIT University, Vellore, India Jabeena A Faculty,

More information

arxiv: v4 [quant-ph] 4 Mar 2014

arxiv: v4 [quant-ph] 4 Mar 2014 Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol Xiang-Chun Ma, Shi-Hai Sun, Mu-Sheng Jiang and Lin-Mei Liang Department of Physics, National

More information

10-GHz clock differential phase shift quantum key distribution experiment

10-GHz clock differential phase shift quantum key distribution experiment 10-GHz clock differential phase shift quantum key distribution experiment Hiroki Takesue 1,2, Eleni Diamanti 3, Carsten Langrock 3, M. M. Fejer 3 and Yoshihisa Yamamoto 3 1 NTT Basic Research Laboratories,

More information

Countermeasure against blinding attacks on low-noise detectors with background noise cancellation scheme

Countermeasure against blinding attacks on low-noise detectors with background noise cancellation scheme > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Countermeasure against blinding attacks on low-noise detectors with background noise cancellation scheme Min Soo

More information

A Practical Method to Achieve Perfect Secrecy

A Practical Method to Achieve Perfect Secrecy A Practical Method to Achieve Perfect Secrecy Amir K. Khandani E&CE Department, University of Waterloo August 3 rd, 2014 Perfect Secrecy: One-time Pad One-time Pad: Bit-wise XOR of a (non-reusable) binary

More information

Polarization-independent subcarrier quantum communication system and its application in ITMO University quantum network

Polarization-independent subcarrier quantum communication system and its application in ITMO University quantum network Polarization-independent subcarrier quantum communication system and its application in ITMO University quantum network Artur Gleim 1,2, Vladimir Egorov 1, Simon Smirnov 1, Vladimir Chistyakov 1, Oleg

More information

High-speed free-space quantum key distribution with automatic tracking for short-distance urban links

High-speed free-space quantum key distribution with automatic tracking for short-distance urban links High-speed free-space quantum key distribution with automatic tracking for short-distance urban links Alberto Carrasco-Casado (1), María-José García-Martínez (2), Natalia Denisenko (2), Verónica Fernández

More information

FUTURE communications networks must offer improved

FUTURE communications networks must offer improved 1 Quantum-Classical Access Networks with Embedded Optical Wireless Links Osama Elmabrok, Student Member, IEEE, Masoud Ghalaii, Student Member, IEEE, and Mohsen Razavi arxiv:1707.080v [quant-ph] 7 Jan 018

More information

Quantum Key Distribution with Integrated Optical Circuits

Quantum Key Distribution with Integrated Optical Circuits Department für Physik Ludwig-Maximilians-Universität München Master s Thesis Quantum Key Distribution with Integrated Optical Circuits Stefan Frick March 28, 2013 Supervised by Prof. Dr. Harald Weinfurter

More information

SHF Communication Technologies AG

SHF Communication Technologies AG SHF Communication Technologies AG Wilhelm-von-Siemens-Str. 23D 12277 Berlin Germany Phone ++49 30 / 772 05 10 Fax ++49 30 / 753 10 78 E-Mail: sales@shf.de Web: http://www.shf.de Application Note DQPSK

More information

This is a repository copy of Quantum-Classical Access Networks with Embedded Optical Wireless Links.

This is a repository copy of Quantum-Classical Access Networks with Embedded Optical Wireless Links. This is a repository copy of Quantum-Classical Access Networks with Embedded Optical Wireless Links. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/106594/ Version: Accepted

More information

Current status of the DARPA Quantum Network

Current status of the DARPA Quantum Network Current status of the DARPA Quantum Network Chip Elliott 1, Alexander Colvin, David Pearson, Oleksiy Pikalo, John Schlafer, Henry Yeh BBN Technologies, 10 Moulton Street, Cambridge MA 02138 ABSTRACT This

More information

Controlling excess noise in fiber optics continuous variables quantum key distribution

Controlling excess noise in fiber optics continuous variables quantum key distribution Controlling excess noise in fiber optics continuous variables quantum key distribution Jérôme Lodewyck, Thierry Debuisschert, Rosa Tualle-Brouri, Philippe Grangier To cite this version: Jérôme Lodewyck,

More information

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical

More information

Encryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme

Encryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme Encryption at the Speed of Light? Towards a cryptanalysis of an optical CDMA encryption scheme Sharon Goldberg * Ron Menendez **, Paul R. Prucnal * *, ** Telcordia Technologies IPAM Workshop on Special

More information

SHF Communication Technologies AG

SHF Communication Technologies AG SHF Communication Technologies AG Wilhelm-von-Siemens-Str. 23 Aufgang D 12277 Berlin Marienfelde Germany Phone ++49 30 / 772 05 10 Fax ++49 30 / 753 10 78 E-Mail: sales@shf.biz Web: http://www.shf.biz

More information

arxiv: v1 [quant-ph] 14 Sep 2017

arxiv: v1 [quant-ph] 14 Sep 2017 Continuous-variable QKD over 50km commercial fiber arxiv:1709.04618v1 [quant-ph] 14 Sep 2017 Yichen Zhang 1,2, Zhengyu Li 1, Ziyang Chen 1, Christian Weedbrook 3, Yijia Zhao 2, Xiangyu Wang 2, Chunchao

More information

arxiv: v2 [quant-ph] 17 Jan 2015

arxiv: v2 [quant-ph] 17 Jan 2015 Robust Shot Noise Measurement for CVQKD Sébastien Kunz-Jacques 1 and Paul Jouguet 1 1 SeQureNet, 23 avenue d Italie, 75013 Paris, France (Dated: June 7, 2018) We study a practical method to measure the

More information

Performance Analysis Of Hybrid Optical OFDM System With High Order Dispersion Compensation

Performance Analysis Of Hybrid Optical OFDM System With High Order Dispersion Compensation Performance Analysis Of Hybrid Optical OFDM System With High Order Dispersion Compensation Manpreet Singh Student, University College of Engineering, Punjabi University, Patiala, India. Abstract Orthogonal

More information

Polarization Shift Keying for free space QKD

Polarization Shift Keying for free space QKD Polarization Shift Keying for free space QKD Effect of noise on reliability of the QKD protocols Ram Soorat and Ashok Vudayagiri Email: avsp@uohyd.ernet.in School of Physics, University of Hyderabad Hyderabad,

More information

A Short Wavelength GigaHertz Clocked Fiber- Optic Quantum Key Distribution System

A Short Wavelength GigaHertz Clocked Fiber- Optic Quantum Key Distribution System Heriot-Watt University School of Engineering and Physical Sciences 1 A Short Wavelength GigaHertz Clocked Fiber- Optic Quantum Key Distribution System Karen J. Gordon, Veronica Fernandez, Paul D. Townsend,

More information

Quantum secured gigabit optical access networks

Quantum secured gigabit optical access networks Quantum secured gigabit optical access networks Bernd Fröhlich 1,*, James F Dynes 1, Marco Lucamarini 1, Andrew W Sharpe 1, Simon W-B Tam 1, Zhiliang Yuan 1 & Andrew J Shields 1 1 Toshiba Research Europe

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Comparative Study of OFDM & MC-CDMA in WiMAX System

Comparative Study of OFDM & MC-CDMA in WiMAX System IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 64-68 Comparative Study of OFDM & MC-CDMA in WiMAX

More information

Delphi. M. W. Roberts. Abstract. An optical communication system is described. The system provides a unique operational capability.

Delphi. M. W. Roberts. Abstract. An optical communication system is described. The system provides a unique operational capability. Delphi M. W. Roberts Abstract An optical communication system is described. The system provides a unique operational capability. 1. Introduction A representation of the system is shown in Figure 1. The

More information

Research Article Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution

Research Article Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution International Optics Volume 211, Article ID 254154, 8 pages doi:1.1155/211/254154 Research Article Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution Morio Toyoshima, 1 Hideki Takenaka,

More information

ETSI GS QKD 003 V1.1.1 ( ) Group Specification

ETSI GS QKD 003 V1.1.1 ( ) Group Specification GS QKD 003 V1.1.1 (2010-12) Group Specification Quantum Key Distribution (QKD); Components and Internal Interfaces Disclaimer This document has been produced and approved by the Quantum Key Distribution

More information

Phase Modulator for Higher Order Dispersion Compensation in Optical OFDM System

Phase Modulator for Higher Order Dispersion Compensation in Optical OFDM System Phase Modulator for Higher Order Dispersion Compensation in Optical OFDM System Manpreet Singh 1, Karamjit Kaur 2 Student, University College of Engineering, Punjabi University, Patiala, India 1. Assistant

More information

Designing Optical Layouts for AEI s 10 meter Prototype. Stephanie Wiele August 5, 2008

Designing Optical Layouts for AEI s 10 meter Prototype. Stephanie Wiele August 5, 2008 Designing Optical Layouts for AEI s 10 meter Prototype Stephanie Wiele August 5, 2008 This summer I worked at the Albert Einstein Institute for Gravitational Physics as a member of the 10 meter prototype

More information

Single Photon Interference Katelynn Sharma and Garrett West University of Rochester, Institute of Optics, 275 Hutchison Rd. Rochester, NY 14627

Single Photon Interference Katelynn Sharma and Garrett West University of Rochester, Institute of Optics, 275 Hutchison Rd. Rochester, NY 14627 Single Photon Interference Katelynn Sharma and Garrett West University of Rochester, Institute of Optics, 275 Hutchison Rd. Rochester, NY 14627 Abstract: In studying the Mach-Zender interferometer and

More information

AFRL-RI-RS-TR

AFRL-RI-RS-TR AFRL-RI-RS-TR-2016-067 INVESTIGATING QUANTUM MODULATION STATES MARCH 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION

More information

Practical free-space quantum key distribution over 10 km in daylight and at night

Practical free-space quantum key distribution over 10 km in daylight and at night Practical free-space quantum key distribution over 10 km in daylight and at night Richard J Hughes, Jane E Nordholt, Derek Derkacs and Charles G Peterson Physics Division, Los Alamos National Laboratory,

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly Generated Bitmap Image

i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly Generated Bitmap Image AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES ISSN:1991-8178 EISSN: 2309-8414 Journal home page: www.ajbasweb.com i-tee An Image Encryption Algorithm based on Multilevel Encryption using a Randomly

More information

BER Analysis for Synchronous All-Optical CDMA LANs with Modified Prime Codes

BER Analysis for Synchronous All-Optical CDMA LANs with Modified Prime Codes BER Analysis for Synchronous All-Optical CDMA LANs with Modified Prime Codes Pham Manh Lam Faculty of Science and Technology, Assumption University Bangkok, Thailand Abstract The analysis of the BER performance

More information

Modelling PM-BPSK Signals for Coherent Optical Transmission over Single-Mode Fiber

Modelling PM-BPSK Signals for Coherent Optical Transmission over Single-Mode Fiber 2013 European Modelling Symposium Modelling PM-BPSK Signals for Coherent Optical Transmission over Single-Mode Fiber Navya Yelloji, Navnith Ravindran, Anand Kumar Electrical and Electronics Engineering

More information

Megabits secure key rate quantum key distribution

Megabits secure key rate quantum key distribution Megabits secure key rate quantum key distribution To cite this article: Q Zhang et al 2009 New J. Phys. 11 045010 View the article online for updates and enhancements. Related content - Differential phase

More information

Turbo-coding of Coherence Multiplexed Optical PPM CDMA System With Balanced Detection

Turbo-coding of Coherence Multiplexed Optical PPM CDMA System With Balanced Detection American Journal of Applied Sciences 4 (5): 64-68, 007 ISSN 1546-939 007 Science Publications Turbo-coding of Coherence Multiplexed Optical PPM CDMA System With Balanced Detection K. Chitra and V.C. Ravichandran

More information

Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA

Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA Lab Report 3: Speckle Interferometry LIN PEI-YING, BAIG JOVERIA Abstract: Speckle interferometry (SI) has become a complete technique over the past couple of years and is widely used in many branches of

More information

Toward a security certificated communication system - How we are learning to stop worrying

Toward a security certificated communication system - How we are learning to stop worrying QCrypt2015 30 th, September 2015 Hitotsubashi-hall, Tokyo, Japan Toward a security certificated communication system - How we are learning to stop worrying Akihisa Tomita Graduate School of Information

More information

Block Ciphers Security of block ciphers. Symmetric Ciphers

Block Ciphers Security of block ciphers. Symmetric Ciphers Lecturers: Mark D. Ryan and David Galindo. Cryptography 2016. Slide: 26 Assume encryption and decryption use the same key. Will discuss how to distribute key to all parties later Symmetric ciphers unusable

More information

Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) Contract Period of Performance (Base + Option): 7 February September 2016

Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) Contract Period of Performance (Base + Option): 7 February September 2016 12 November 2015 Office of Naval Research 875 North Randolph Street, Suite 1179 Arlington, VA 22203-1995 BBN Technologies 10 Moulton Street Cambridge, MA 02138 Delivered via Email to: richard.t.willis@navy.mil

More information

High-repetition rate quantum key distribution

High-repetition rate quantum key distribution Invited Paper High-repetition rate quantum key distribution J. C. Bienfang, A. Restelli, D. Rogers, A. Mink, B. J. Hershman, A. Nakassis, X. Tang, L. Ma, H. Xu, D. H. Su, Charles W. Clark, and Carl J.

More information

arxiv: v3 [quant-ph] 19 Jun 2015

arxiv: v3 [quant-ph] 19 Jun 2015 Generating the local oscillator locally in continuous-variable quantum key distribution based on coherent detection arxiv:1503.0066v3 [quant-ph] 19 Jun 015 Bing Qi, 1,, Pavel Lougovski, 1 Raphael Pooser,

More information

Comparison of Polarization Shift Keying and Amplitude Shift Keying Modulation Techniques in FSO

Comparison of Polarization Shift Keying and Amplitude Shift Keying Modulation Techniques in FSO Comparison of Polarization Shift Keying and Amplitude Shift Keying Modulation Techniques in FSO Jeema P. 1, Vidya Raj 2 PG Student [OEC], Dept. of ECE, TKM Institute of Technology, Kollam, Kerala, India

More information

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result.

Solution: Alice tosses a coin and conveys the result to Bob. Problem: Alice can choose any result. Example - Coin Toss Coin Toss: Alice and Bob want to toss a coin. Easy to do when they are in the same room. How can they toss a coin over the phone? Mutual Commitments Solution: Alice tosses a coin and

More information

Technical Brief #2. Depolarizers

Technical Brief #2. Depolarizers Technical Brief #2 Depolarizers What is a depolarizer?...2 Principle of operation...2 Source coherence function dependence...2 Depolarizer realization...3 Input linear polarization state definition...4

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Ultrashort Pulse Measurement Using High Sensitivity Two Photon Absorption Waveguide Semiconductor

Ultrashort Pulse Measurement Using High Sensitivity Two Photon Absorption Waveguide Semiconductor Ultrashort Pulse Measurement Using High Sensitivity Two Photon Absorption Wguide Semiconductor MOHAMMAD MEHDI KARKHANEHCHI Department of Electronics, Faculty of Engineering Razi University Taghbostan,

More information

NEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA

NEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA NEW LASER ULTRASONIC INTERFEROMETER FOR INDUSTRIAL APPLICATIONS B.Pouet and S.Breugnot Bossa Nova Technologies; Venice, CA, USA Abstract: A novel interferometric scheme for detection of ultrasound is presented.

More information

Swept Wavelength Testing:

Swept Wavelength Testing: Application Note 13 Swept Wavelength Testing: Characterizing the Tuning Linearity of Tunable Laser Sources In a swept-wavelength measurement system, the wavelength of a tunable laser source (TLS) is swept

More information

Motion-Compensated Handheld Quantum Key Distribution System

Motion-Compensated Handheld Quantum Key Distribution System Motion-Compensated Handheld Quantum Key Distribution System Hyunchae Chun 1, Iris Choi 2, Grahame Faulkner 1, Larry Clarke 3, Bryan Barber 3, Glenn George 3, Colin Capon 3, Antti Niskanen 4, Joachim Wabnig

More information

π code 0 Changchun,130000,China Key Laboratory of National Defense.Changchun,130000,China Keywords:DPSK; CSRZ; atmospheric channel

π code 0 Changchun,130000,China Key Laboratory of National Defense.Changchun,130000,China Keywords:DPSK; CSRZ; atmospheric channel 4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Differential phase shift keying in the research on the effects of type pattern of space optical

More information

arxiv: v1 [quant-ph] 15 May 2016

arxiv: v1 [quant-ph] 15 May 2016 A directly phase-modulated light source Z. L. Yuan, 1, B. Fröhlich, 1 M. Lucamarini, 1 G. L. Roberts, 1, 2 J. F. Dynes, 1 and A. J. Shields 1 1 Toshiba Research Europe Ltd, 28 Cambridge Science Park, arxiv:165.4594v1

More information

Manchester Coding and Decoding Generation Theortical and Expermental Design

Manchester Coding and Decoding Generation Theortical and Expermental Design American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS) ISSN (Print) 2313-4410, ISSN (Online) 2313-4402 Global Society of Scientific Research and Researchers http://asrjetsjournal.org/

More information

Lecture 7 Fiber Optical Communication Lecture 7, Slide 1

Lecture 7 Fiber Optical Communication Lecture 7, Slide 1 Dispersion management Lecture 7 Dispersion compensating fibers (DCF) Fiber Bragg gratings (FBG) Dispersion-equalizing filters Optical phase conjugation (OPC) Electronic dispersion compensation (EDC) Fiber

More information

PHASE TO AMPLITUDE MODULATION CONVERSION USING BRILLOUIN SELECTIVE SIDEBAND AMPLIFICATION. Steve Yao

PHASE TO AMPLITUDE MODULATION CONVERSION USING BRILLOUIN SELECTIVE SIDEBAND AMPLIFICATION. Steve Yao PHASE TO AMPLITUDE MODULATION CONVERSION USING BRILLOUIN SELECTIVE SIDEBAND AMPLIFICATION Steve Yao Jet Propulsion Laboratory, California Institute of Technology 4800 Oak Grove Dr., Pasadena, CA 91109

More information

Charles M. Simmons P-23/CON. Jane E. Nordholt, NIS-1

Charles M. Simmons P-23/CON. Jane E. Nordholt, NIS-1 .-.. -.,-. -, LA-uR-99-A74f I Approved forpubl[c release; distribution /s unlimited 96114 Title: Quantum Cryptography for secure Communications to Low-Earth Orbit Satellites. A th@): Richard J. Hughes,

More information

Controlled dense coding for continuous variables using three-particle entangled states

Controlled dense coding for continuous variables using three-particle entangled states PHYSICAL REVIEW A 66 032318 2002 Controlled dense coding for continuous variables using three-particle entangled states Jing Zhang Changde Xie and Kunchi Peng* The State Key Laboratory of Quantum Optics

More information

Ultra high speed optical transmission using subcarrier-multiplexed four-dimensional LDPCcoded

Ultra high speed optical transmission using subcarrier-multiplexed four-dimensional LDPCcoded Ultra high speed optical transmission using subcarrier-multiplexed four-dimensional LDPCcoded modulation Hussam G. Batshon 1,*, Ivan Djordjevic 1, and Ted Schmidt 2 1 Department of Electrical and Computer

More information

Coherent Receivers: A New Paradigm For Optical Components. ECOC Market Focus September 20, 2010

Coherent Receivers: A New Paradigm For Optical Components. ECOC Market Focus September 20, 2010 Photonic Integrated Circuit Based Coherent Receivers: A New Paradigm For Optical Components G. Ferris Lipscomb ECOC Market Focus September 20, 2010 Agenda Advanced Coding Schemes Use Phase Encoding To

More information

Q uantum key distribution (QKD)1 is an important technique for future quantum information applications.

Q uantum key distribution (QKD)1 is an important technique for future quantum information applications. OPEN SUBJECT AREAS: QUANTUM INFORMATION QUANTUM OPTICS Received 14 November 2013 Accepted 11 March 2014 Published 2 April 2014 A fiber-based quasi-continuous-wave quantum key distribution system Yong Shen,

More information

High Speed Homodyne Detector for Gaussian-Modulated Coherent-State Quantum Key Distribution. Yuemeng Chi

High Speed Homodyne Detector for Gaussian-Modulated Coherent-State Quantum Key Distribution. Yuemeng Chi High Speed Homodyne Detector for Gaussian-Modulated Coherent-State Quantum Key Distribution by Yuemeng Chi A thesis submitted in conformity with the requirements for the degree of Master of Applied Science

More information

V.Sorge/E.Ritter, Handout 2

V.Sorge/E.Ritter, Handout 2 06-20008 Cryptography The University of Birmingham Autumn Semester 2015 School of Computer Science V.Sorge/E.Ritter, 2015 Handout 2 Summary of this handout: Symmetric Ciphers Overview Block Ciphers Feistel

More information

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES

COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES COMPUTER COMMUNICATION AND NETWORKS ENCODING TECHNIQUES Encoding Coding is the process of embedding clocks into a given data stream and producing a signal that can be transmitted over a selected medium.

More information

Jones matrix analysis of high-precision displacement measuring interferometers

Jones matrix analysis of high-precision displacement measuring interferometers Jones matrix analysis of high-precision displacement measuring interferometers Peter de Groot, Laurel Brook Road, Middlefield, CT USA 06455 e-mail: peterd@zygo.com Abstract I analyze error sources in high-performance

More information

A New Logic Gate for High Speed Optical Signal Processing Using Mach- Zehnder Interferometer (MZI)

A New Logic Gate for High Speed Optical Signal Processing Using Mach- Zehnder Interferometer (MZI) A New Logic Gate for High Speed Optical Signal Processing Using Mach- Zehnder Interferometer (MZI) Dr. Sanjeev Kumar 1, Bhushan Kumar 2, Akshay Singh 3 Assistant Professor, Department of Electronics and

More information

NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR WAVELENGTH SELEC- TIVE SWITCHING BASED OPTICAL NETWORKS

NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR WAVELENGTH SELEC- TIVE SWITCHING BASED OPTICAL NETWORKS Progress In Electromagnetics Research Letters, Vol. 9, 93 100, 2009 NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR WAVELENGTH SELEC- TIVE SWITCHING BASED OPTICAL NETWORKS A. Banerjee

More information

Lecture-8 Transmission of Signals

Lecture-8 Transmission of Signals Lecture-8 Transmission of Signals The signals are transmitted as electromagnetic waveforms. As the signal may be analog or digital, there four case of signal transmission. Analog data Analog Signal:- The

More information

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday

Lecture 3: Wireless Physical Layer: Modulation Techniques. Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday Lecture 3: Wireless Physical Layer: Modulation Techniques Mythili Vutukuru CS 653 Spring 2014 Jan 13, Monday Modulation We saw a simple example of amplitude modulation in the last lecture Modulation how

More information

Three-level Code Division Multiplex for Local Area Networks

Three-level Code Division Multiplex for Local Area Networks Three-level Code Division Multiplex for Local Area Networks Mokhtar M. 1,2, Quinlan T. 1 and Walker S.D. 1 1. University of Essex, U.K. 2. Universiti Pertanian Malaysia, Malaysia Abstract: This paper reports

More information

Next-Generation Optical Fiber Network Communication

Next-Generation Optical Fiber Network Communication Next-Generation Optical Fiber Network Communication Naveen Panwar; Pankaj Kumar & manupanwar46@gmail.com & chandra.pankaj30@gmail.com ABSTRACT: In all over the world, much higher order off modulation formats

More information

A NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR DWDM OPTICAL NETWORKS

A NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR DWDM OPTICAL NETWORKS Progress In Electromagnetics Research M, Vol. 11, 213 223, 2010 A NEW APPROACH TO DESIGN DIGITALLY TUNABLE OPTICAL FILTER SYSTEM FOR DWDM OPTICAL NETWORKS A. Banerjee Department of Electronics and Communication

More information

Data Transmission Definition Data Transmission Analog Transmission Digital Transmission

Data Transmission Definition Data Transmission Analog Transmission Digital Transmission Data Transmission Definition Data Transmission Data transmission occurs between transmitter (sender) and receiver over some transmission medium. This transfer of data takes place via some form of transmission

More information

Electronically tunable fabry-perot interferometers with double liquid crystal layers

Electronically tunable fabry-perot interferometers with double liquid crystal layers Electronically tunable fabry-perot interferometers with double liquid crystal layers Kuen-Cherng Lin *a, Kun-Yi Lee b, Cheng-Chih Lai c, Chin-Yu Chang c, and Sheng-Hsien Wong c a Dept. of Computer and

More information

arxiv: v1 [quant-ph] 23 Oct 2012

arxiv: v1 [quant-ph] 23 Oct 2012 Experimental demonstration of long-distance continuous-variable quantum key distribution Paul Jouguet, 1, 2 Sébastien Kunz-Jacques, 2 Anthony Leverrier, 3 Philippe Grangier, 4 and Eleni Diamanti 1 1 LTCI,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Modifications of the coherence radar for in vivo profilometry in dermatology

Modifications of the coherence radar for in vivo profilometry in dermatology Modifications of the coherence radar for in vivo profilometry in dermatology P. Andretzky, M. W. Lindner, G. Bohn, J. Neumann, M. Schmidt, G. Ammon, and G. Häusler Physikalisches Institut, Lehrstuhl für

More information