Unlock instant, AI-driven research and patent intelligence for your innovation.

Physical modeling method of quantum key distribution system for security analysis

A technology of quantum key distribution and modeling method, which is applied in the field of physical modeling of quantum key distribution system for security analysis, and can solve problems such as data that cannot be simulated, quantitative analysis, and theoretical analysis.

Active Publication Date: 2020-01-24
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current existing modeling methods only stay at the level of theoretical analysis, and cannot obtain simulated data for quantitative analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical modeling method of quantum key distribution system for security analysis
  • Physical modeling method of quantum key distribution system for security analysis
  • Physical modeling method of quantum key distribution system for security analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation. figure 1 It is a schematic diagram of the software structure of the physical modeling method for the security analysis-oriented quantum key distribution system of the present invention, figure 2 It is a software flow chart of the physical modeling method for the security analysis-oriented quantum key distribution system of the present invention. image 3 It is the data format of the physical modeling method for the security analysis-oriented quantum key distribution system of the present invention.

[0020] The present invention includes two software emulation clients, Alice and Bob. The two ends transmit data through the TCP / IP protocol, and send and receive data by calling the socket function of C language. The software structure is as follows: figure 1 shown. The workflow of the software is as figure 2 shown.

[0021] Input...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a physical modeling method of a quantum key distribution system facing security analysis. Modeling physical devices directed at three parts of a single photon source, a quantum channel and a single photon detector in the quantum key distribution system so as to obtain simulation data which sent results from an actual physical system. In a simulation system, the parameters of the physical devices of the quantum key distribution system can be configured so that the different physical devices of the quantum key distribution system can be simulated by using the simulation system. The simulation system is composed of two clients that respectively are an Alice terminal and a Bob terminal. Both terminals are composed of a simulation module of physical devices, a data generation module and a data transmission module. The quantum key distribution technology has been commercialized, and the simulation system designed by the invention has strong practical value and good application prospect.

Description

technical field [0001] The invention belongs to the technical field of network systems, and in particular relates to a security analysis-oriented physical modeling method for a quantum key distribution system. Background technique [0002] Glossary: [0003] In quantum communication, the communicating parties are called Alice and Bob respectively. Among them, the Alice end is the light source end, and the single-photon source continuously emits single-photon pulses; the Bob end is the detection end, and the single-photon detector receives the photons from the Alice end for measurement. [0004] Quantum key distribution is based on the basic principles of quantum mechanics and has theoretical absolute security. It plays an irreplaceable role in national defense, finance and government affairs. Many countries in the world have invested a lot of manpower and material resources in research. [0005] With the gradual practical application of quantum key distribution system, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 赵宝康虞万荣王宝生刘波吴纯青毛席龙赵锋韩彪时向泉陶静彭岩原玉磊刘博
Owner NAT UNIV OF DEFENSE TECH