White Rose University Consortium logo
University of Leeds logo University of Sheffield logo York University logo

A Solution for Post Quantum Security Using Existing Communications Infrastructures

Wilson, Freya Louise (2017) A Solution for Post Quantum Security Using Existing Communications Infrastructures. PhD thesis, University of Leeds.

[img] Text (PhD Thesis)
Wilson_FL_Physics_PhD_2017.pdf - Final eThesis - complete (pdf)
Restricted until 1 July 2023.

Request a copy


The application of quantum cryptographic methods to existing communications infrastructures can be extremely difficult owing to the complex nature of quantum transmission methods. The premise of this thesis is an examination of methods to combine quantum-safe security with standard protocols, such as phase shift keying. Use is made of an algorithm previously presented by Ueli Maurer which allows for the distillation of a mutual symmetric cryptographic key from some shared secret information (Maurer, 1993). This algorithm is examined extensively and incorporated into a complete protocol which can be applied to pre-existing communications using phase shift keying. Primarily, one must consider the theoretical noise capabilities. In order to ensure the security of these communications the properties of microwaves are characterised and established as quantum-limited coherent states with a fractional excess noise on measurement. Side channel attacks are more prolific when one considers the quantum measurement attack vector, especially when one considers that the full extent of these attacks in not yet known. If the same security could be extracted from the distillation algorithm, without relying upon quantum mechanics as the resource, then a universal standard for widespread implementation could be produced. The properties of random numbers are shown to be a sufficent resource for the advantage distillation algorithm which provides a strong candidate for a possible post-quantum secure universal standard. The security of this (and various other protocols), however, relies upon the presence of an ‘impenetrable’ safe-house for trusted parties to prepare their cryptogrpahic resource (whether it be quantum or randomnumbers). A side channel attack is examined which is based on the possibility of signal leakage from a shielded room. The use of the vector potential elucidates a possible method for signals to be detected outside a Faraday shielded enclosure - methods for performing this detection are examined and a characterisation of the properties of the leakage is performed. Leakage is detected from a shielded room at the National Authority for Counter Eavesdropping. It is concluded that a threat exists from this. However, there are possibilities for counteracting this using certain dielectric materials which need to be explored further. Overall, it is established that advances have been made towards developing a post-quantum secure cryptographic method, which can be straight forwardly implemented in a variety of existing infrastructures using phase shift keying protocols, and even in a universal implementation using random numbers as a secure resource.

Item Type: Thesis (PhD)
Keywords: Quantum Cryptography, QKD, Quantum Key Distribution, Satellite Communications
Academic Units: The University of Leeds > Faculty of Maths and Physical Sciences (Leeds)
The University of Leeds > Faculty of Maths and Physical Sciences (Leeds) > School of Physics and Astronomy (Leeds)
Depositing User: Freya Louise Wilson
Date Deposited: 29 Jun 2018 12:01
Last Modified: 29 Jun 2018 12:01
URI: http://etheses.whiterose.ac.uk/id/eprint/20820

Please use the 'Request a copy' link(s) above to request this thesis. This will be sent directly to someone who may authorise access.
You can contact us about this thesis. If you need to make a general enquiry, please see the Contact us page.

Actions (repository staff only: login required)