EnglishPortugueseSpanish

Quantum Cryptography: Competitive Positioning of the Dandelion Protocol

2X place

Project summary

On the internet, secrets have an expiration date: the algorithms that protect virtual communications today have their security based on the time taken to break them (BENNETT, 1992) and subject to advances in computing theory (NIST, 2017, COOK, 2000, BENNETT, BRASSARD, 1985). In other words, any and all information sent over the internet today will be vulnerable in the future. Fortunately, scientific and technological development can offer us a safe alternative: from quantum cryptography, it is possible to obtain an inviolable communication once this is established in a secure way (BENNETT, 1992, BENNETT, BRASSARD, 1985). There is, however, a small security breach in the establishment of this communication, and it is precisely on this that this work acts. In its previous segment, the Dandelion Protocol was developed, an algorithm that applies in an unprecedented way (see revisions by GISIN et al., 2001, PIRANDOLA et al., 2020) the technology of quantum memories in cryptography, offering a range of new possibilities that would potentially make you less vulnerable to third-party attacks in establishing communication than your competitors. It was verified, in this segment of the work, whether these potentialities materialize or not, from two theoretical procedures that compared the performance of the authorial protocol to BB84, a quantum cryptography protocol developed by Bennett and Brassard in 1984. The tests also verified the differences resulting from variations in the number of polarizations used in the Dandelion Protocol. In the first procedure, a cryptographic attack was carried out, which consists of measuring the photons used in the establishment of cryptography in intermediate polarizations to those of the attacked protocol. Bitrates yielded per qubit equal to that of the BB84 were obtained for the case of the Dandelion Protocol with 2 polarizations, and lower than it for the cases with 3 or more polarizations. In the second, we observed the information provided by the protocol developed in the face of intercept and forwarding attacks – in which a third party performs the measurements on the photons it has at its disposal, respecting the polarizations used by the system. The transfer of information in the Dandelion Protocol was, in this case, equal to that of the BB84 in its case of 2 polarizations and higher for the cases of 3 or more polarizations. The theoretical procedures, associated with the literature review, led to the conclusion that the safest case of the Dandelion Protocol is that of 2 polarizations, and it is comparable to the BB84 in terms of safety, it still has a greater efficiency in relation to to his predecessor, which competitively consecrates him in relation to him.

Students

Henrique Vieira dos Santos Guerra

Guidance counsellors

Cristiane Rodrigues Caetano Tavolaro

Institution

Dante Alighieri College
  SP -
  Brazil

Popular vote*

Did you like it? So vote and share now:

2+

Leave your comment

What did you think of this project? Participate by leaving your comment below:

Subscribe now
Notify of
guest
0 Comments
Inline feedback
View all comments

Popular vote*

Did you like it? So vote and share now:

2+

Students

Henrique Vieira dos Santos Guerra

Guidance counsellors

Cristiane Rodrigues Caetano Tavolaro

Institution

Colégio Dante Alighieri
  SP –
  Brazil

Educational Incentives and Awards Offered

Research Areas

Get to know the projects that are competing in all of Mostratec Virtual's research areas:

Cellular and Molecular Biology and Microbiology
Biochemistry and Chemistry
Environmental Sciences
Animal and Plant Sciences
Computer Science
Planetary and Earth Sciences and Mathematics and Physics
Health Sciences
Education and Humanities
Environmental and Sanitary Engineering
Engineering and Materials
Electrical engineering
Electronic Engineering
Mechanical Engineering
History and Social Sciences
0
Click to leave your comment and participate!x
()
x

Popular Jury Awards

For the People's Jury awards, only single votes (one per user) and that are cast between 0/00 and 26:10 on 23/59 will be considered valid.

Entrepreneur Profile Test

Fill in your details below to perform your test: