• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Journal Issues / Basic Complexity / Quantum Key Distribution: Boon or Bust?

Quantum Key Distribution: Boon or Bust?

Published in Journal of Cyber Security and Information Systems
Volume: 4 Number: 2 - Basic Complexity

Authors: Logan O. Mailloux, Dr. Michael R. Grimaila, Douglas D. Hodson, Colin V. McLaughlin and Gerald B. Baumgartner
Posted: 07/21/2016 | Leave a Comment

The Boon

While there are several ways to describe the advantages of QKD, in this article the authors’ have chosen to approach this challenge from the user’s perspective. Meaning, we desire to provide a useful commentary which addresses the utility of QKD (and its related developments) for an end user and not merely elaborate on the merits of its research or what it could be.

  1. Generates Unconditionally Secure Keying Material – Leveraging the laws of quantum mechanics, QKD is the only known means which can grow unlimited amounts of symmetric keying material to effectively employ the one-time pad cryptosystem (the only unbreakable encryption scheme known). This formalized information-theoretic security foundation is much stronger than conventional encryption techniques which depend on demonstrated computational complexity. This is precisely why QKD has gained global recognition as an emerging cybersecurity technology in the face of quantum computing advances which threaten other conventional cryptosystems such as RSA.
  2. Quantum Random Number Generators – In order to maintain their information-theoretic security posture, QKD systems require true sources of randomness. Thus, the advancement of QKD has successfully facilitated the development of quantum random number generators. These devices provide a physical source of randomness based on quantum phenomenon which is desirable for cryptographic devices, software applications, and other industries. Of note, the gaming/gambling industry is said to be the world’s largest consumer of random number generators and a fiscally rewarding enterprise. While QKD upstarts seem to come and go, there is a definite need for cheap and reliable sources of entropy in the commercial market.
  3. Strengthens the Cybersecurity Field – QKD encourages multidisciplinary collaboration amongst information theorists, engineers, cryptography experts, security professionals, and physicists that may not occur otherwise. Establishing these types of interactions is critical for advancements in several cyber related fields such as quantum communication, quantum sensing, and quantum computing. For example, the integration of computer scientists and quantum physicists is necessary for the development and utilization of quantum computing algorithms. On a related note, QKD has also brought about the occurrence of “Quantum Hacking” (Institute of Quantum Computing, University of Waterloo, 2014). This growing specialty area is testing the security of new quantum technologies and protocols, and perhaps someday, we’ll even have security assessments which include quantum red teams.
Pages: Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8

Previous Article:
« Computer Supported Training Solutions: Discussion of a...
Next Article:
Cloudonomics: A Rigorous Approach to Cloud Benefit... »

Authors

Logan O. Mailloux
Logan O. Mailloux
Logan O Mailloux, CISSP, CSEP (BS 2002, MS 2008, PhD 2015) is a commissioned officer in the United States Air Force and Assistant Professor at the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, Ohio, USA. His research interests include system security engineering, complex information communication and technology implementations, and quantum key distribution systems. He is a member of Tau Beta Pi, Eta Kappa Nu, INCOSE, the ACM, and IEEE.
Dr. Michael R. Grimaila
Dr. Michael R. Grimaila
Michael R Grimaila, CISM, CISSP (BS 1993, MS 1995, PhD 1999, Texas A&M University) is Professor and Head of the Systems Engineering department and member of the Center for Cyberspace Research (CCR) at the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, Ohio, USA. He is a member of Tau Beta Pi, Eta Kappa Nu, the ACM, a Senior Member of the IEEE, and a Fellow of the ISSA. His research interests include computer engineering, mission assurance, quantum communications and cryptography, data analytics, network management and security, and systems engineering.
Douglas D. Hodson
Douglas D. Hodson
Douglas D Hodson (BS 1985, MS 1987, PhD 2009) is an Assistant Professor of Software Engineering at the AFIT, Wright-Patterson AFB, Ohio, USA. His research interests include computer engineering, software engineering, real-time distributed simulation, and quantum communications. He is also a DAGSI scholar and a member of Tau Beta Pi.
Colin V. McLaughlin
Colin V. McLaughlin
Colin V McLaughlin, PhD (BA 2003, PhD 2010) is a Research Physicist at the United States Naval Research Laboratory, Washington, D.C., USA. He specializes in photonic communication devices and systems.
Gerald B. Baumgartner
Gerald B. Baumgartner
Gerald B. Baumgartner, PhD (BS 1971, MS 1973, PhD 1980, Illinois Institute of Technology) is a Research Physicist at the Laboratory for Telecommunications Sciences, College Park, Maryland, USA. He is a member of the American Physical Society, the Optical Society of America and the Society for Industrial and Applied Mathematics. Dr Baumgartner’s research interests include quantum optics, quantum communications, quantum information, communications security, communications system modeling and simulation and statistical signal processing.

Reader Interactions

Leave a Comment Cancel

You must be logged in to post a comment.

sidebar

Blog Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

CSIAC Journal - Launching Innovation Through Medical Modeling and Simulation Technologies

CSIAC Journal Cover Volume 5 Number 4

This Special Edition of the Journal will provide a glimpse into current efforts to improve military medical training with simulation-based solutions.

Read the Journal

CSIAC Journal - Innovation Based Ecosystems

CSIAC Journal Cover Volume 5 Number 4

This issue of the Journal of Cyber Security & Information Systems explores how managing fast adoption modern-based system has more to do with understanding capabilities, interdependency between systems and effectively operating in the new paradigm than it has to do with differentiating product features.

Read the Journal

Recent Video Podcasts

  • What is DevOps? from a tools point of view Series: CSIAC Webinars
  • 5th Generation (5G) Technology Series: The CSIAC Podcast
  • Malvertising Explored Series: The CSIAC Podcast
  • Cybersecurity Arms Race – Modernizing the Arsenal Series: CSIAC Webinars
  • Cyber Situational Awareness Series: The CSIAC Podcast
View all Podcasts

Upcoming Events

Thu 28

BSides Columbus 2019

February 28 - March 1
Columbus OH
United States
Organizer: BSides Columbus
Mar 19

1st NATO – Industry Workshop on Autonomous Cyber Defence

March 19 @ 09:30 - 16:00 EDT
Cranfield Bedfordshire MK43 0AL
United Kingdom
Organizer: Cranfield University
View all Events

Recently Active Members

Profile picture of jburkhart04
Profile picture of Cyberhawk119
Profile picture of CSIACAdmin
Profile picture of cfasolo22
Profile picture of jrice
Profile picture of emuslic03
Profile picture of nmaida
Profile picture of svenditti
Profile picture of aizzo12
Profile picture of jsupino09
Profile picture of scottrill10
Profile picture of sphillips21
Profile picture of ebromley22
Profile picture of jlewis05
Profile picture of aduong29
Profile picture of kellermannrobert
Profile picture of gustavplato
Profile picture of bbarksdale

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More