Signals and communication technology, Aug 19, 2018
This chapter presents an ultra-secure router-to-router key exchange system. The key exchange proc... more This chapter presents an ultra-secure router-to-router key exchange system. The key exchange process can be initiated by either router at will and can be carried out as often as required. The cryptographic strength of the proposed protocols lies in the use of multi-stage transmission where the number of variables exceeds the number of stages by one, ensuring that the number of possible measurements is one less that the number of variables. The proposed system carries out all processing in electronics and is not vulnerable to the man in the middle attack. The treatment presented in this chapter is based on the authors’ work in [1, 2].
Signals and communication technology, Aug 19, 2018
This chapter analyzes intercept-and-resend and photon number splitting attacks in the multi-stage... more This chapter analyzes intercept-and-resend and photon number splitting attacks in the multi-stage multi-photon protocol. It lays down the conditions under which the multi-stage multi-photon protocol can approach the strength of a quantum-secure protocol. The material presented in this chapter is based on the authors’ work previously published in [16].
Signals and communication technology, Aug 19, 2018
This chapter extends the application space of the multi-stage multi-photon protocol to wireless c... more This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE 802.11i protocol.
IRE transactions on communications systems, Nov 1, 1975
This concise paper presents a new network approach to delay minimization in a synchronous network... more This concise paper presents a new network approach to delay minimization in a synchronous network. The delay minimization is achieved by controlling the demultiplexing frame with respect to the incoming frame in a master frame system.
Signals and communication technology, Aug 19, 2018
Preceding chapters of the book have explored using the polarization channel of an optical fiber f... more Preceding chapters of the book have explored using the polarization channel of an optical fiber for transmitting secure information without the need for encryption keys. In addition, Chap. 10 has offered a means to use the polarization channel for detecting any malicious attempt to pilfer information in transit over an optical fiber. This chapter introduces the use of the polarization channel of an optical fiber to transfer data; more specifically, exchange symmetric keys between the two ends of the optical fiber. Use of the symmetric keys will allow any conventional symmetric encryption to take place between any number of data channels supported by the optical fiber. We do note that any encryption based on symmetric keys can be only computationally secure but, since the keys can be exchanged at a rapid rate, we can still achieve a high level of security on the data channel. Parts of this chapter have been previously published in [7, 8].
Dramatic paradigm shifts over the past few centuries have led to a rich landscape of options in h... more Dramatic paradigm shifts over the past few centuries have led to a rich landscape of options in human and machine communication. Communication today is deeply intertwined with our personal and social lives in addition to being a vital part of businesses and government operations---both overt and covert. This talk will address the evolving role that the fundamental laws of quantum physics are likely to play in giving communication yet another dimension in its richness. Quantum communication will bring about not only communication in the form as we know it, but also ensure that it is unconditionally secure as it transits through any medium. Given that information is the currency of a modern society, its security is paramount for the wellbeing of an individual, a society, a nation, or the globe as a whole. The talk will discuss the short history of quantum communication and draw upon the theoretical and experimental work that the author and his colleagues have conducted over the past few years in order to chart out the likely course of future events in the emerging age of secure communication.
Signals and communication technology, Aug 19, 2018
This chapter presents an ultra-secure router-to-router key exchange system. The key exchange proc... more This chapter presents an ultra-secure router-to-router key exchange system. The key exchange process can be initiated by either router at will and can be carried out as often as required. The cryptographic strength of the proposed protocols lies in the use of multi-stage transmission where the number of variables exceeds the number of stages by one, ensuring that the number of possible measurements is one less that the number of variables. The proposed system carries out all processing in electronics and is not vulnerable to the man in the middle attack. The treatment presented in this chapter is based on the authors’ work in [1, 2].
Signals and communication technology, Aug 19, 2018
This chapter analyzes intercept-and-resend and photon number splitting attacks in the multi-stage... more This chapter analyzes intercept-and-resend and photon number splitting attacks in the multi-stage multi-photon protocol. It lays down the conditions under which the multi-stage multi-photon protocol can approach the strength of a quantum-secure protocol. The material presented in this chapter is based on the authors’ work previously published in [16].
Signals and communication technology, Aug 19, 2018
This chapter extends the application space of the multi-stage multi-photon protocol to wireless c... more This chapter extends the application space of the multi-stage multi-photon protocol to wireless communication. In particular, it examines the viability of using the multi-stage multi-photon protocol for secure key distribution in the IEEE 802.11i protocol.
IRE transactions on communications systems, Nov 1, 1975
This concise paper presents a new network approach to delay minimization in a synchronous network... more This concise paper presents a new network approach to delay minimization in a synchronous network. The delay minimization is achieved by controlling the demultiplexing frame with respect to the incoming frame in a master frame system.
Signals and communication technology, Aug 19, 2018
Preceding chapters of the book have explored using the polarization channel of an optical fiber f... more Preceding chapters of the book have explored using the polarization channel of an optical fiber for transmitting secure information without the need for encryption keys. In addition, Chap. 10 has offered a means to use the polarization channel for detecting any malicious attempt to pilfer information in transit over an optical fiber. This chapter introduces the use of the polarization channel of an optical fiber to transfer data; more specifically, exchange symmetric keys between the two ends of the optical fiber. Use of the symmetric keys will allow any conventional symmetric encryption to take place between any number of data channels supported by the optical fiber. We do note that any encryption based on symmetric keys can be only computationally secure but, since the keys can be exchanged at a rapid rate, we can still achieve a high level of security on the data channel. Parts of this chapter have been previously published in [7, 8].
Dramatic paradigm shifts over the past few centuries have led to a rich landscape of options in h... more Dramatic paradigm shifts over the past few centuries have led to a rich landscape of options in human and machine communication. Communication today is deeply intertwined with our personal and social lives in addition to being a vital part of businesses and government operations---both overt and covert. This talk will address the evolving role that the fundamental laws of quantum physics are likely to play in giving communication yet another dimension in its richness. Quantum communication will bring about not only communication in the form as we know it, but also ensure that it is unconditionally secure as it transits through any medium. Given that information is the currency of a modern society, its security is paramount for the wellbeing of an individual, a society, a nation, or the globe as a whole. The talk will discuss the short history of quantum communication and draw upon the theoretical and experimental work that the author and his colleagues have conducted over the past few years in order to chart out the likely course of future events in the emerging age of secure communication.
Uploads
Papers by Pramode Verma