Abstract
Protocols and applications could profit of quantum cryptography to secure communications. The applications of quantum cryptography are linked to telecommunication services that require very high level of security such as bank transactions.
The aim of this paper is to present the possibility to use quantum cryptography in critical financial transactions, to analyse the use of quantum key distribution within IPSEC to secure these transactions and to present the estimated performances of this solution.
After having introduced basic concepts in quantum cryptography, we describe a scenario of using quantum key distribution in bank transactions in Switzerland. Then, we propose a solution that integrate quantum key distribution into IPSEC. A performance analysis is done to demonstrate the operational feasibility of this solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ghernaouti-Hélie, S., Sfaxi, M.A, Hauser, A., Riguidel, M., Alléaume, R.: Business model: advantages, scenarios, patents and laws related to quantum cryptography. Secoqc project deliverable (2004)
Alléaume, R.: Réalisation expérimentale de sources de photons uniques, caractérisation et application à la cryptographie quantique (Secoqc partner) (2004)
Bennet, C., Brassard, G.: IEEE International Conference on Computers, Systems, and Signal Processing. IEEE Press, Los Alamitos (1983)
Bennet, C.: Quantum Cryptography: Uncertainty in the Service of Privacy. Science 257 (1992)
Bethune, D.S., Risk, W.P.: AutoCompensating quantum cryptography. New journal of physics 4, 1–42 (2002), http://www.iop.org/EJ/article/1367-2630/4/1/342/nj2142.html
Clark, C.W., Bienfang, J.C., Gross, A.J., Mink, A., Hershman, B.J., Nakassis, A., Tang, X., Lu, R., Su, D.H., Williams, C.J., Hagley, E.W., Wen, J.: Quantum key distribution with 1.25 Gbps clock synchronization, Optics Express (2000)
Ekert, A.: Quantum Cryptography based on Bell’s Theorem. Physical Review Letters (1991), http://prola.aps.org/abstract/PRL/v67/i6/p661_1
Elliott, C.: Building the quantum network. New Journal of Physics 4 46.1-46.12 (2002)
Elliott, C., Pearson, D., Troxel, G.: Quantum Cryptography in Practice (2003)
Freebsd people. IPsec outline. URL: http://people.freebsd.org/~julian/IPsec_4_Dummies.html
freesoft,IPsec Overview. (2004). URL http://www.freesoft.org/CIE/Topics/141.htm
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum Cryptography. Reviews of Modern Physics 74 (2002), http://arxiv.org/PS_cache/quant-ph/pdf/0101/0101098.pdf
Grosshans,Van Assche, Wenger, Brouri, Cerf, Grangier: Quantum key distribution using gaussian-modulated coherent states. Letter to nature (2003), http://www.mpq.mpg.de/Theorygroup/CIRAC-/people/grosshans/papers/Nat421_238.pdf
Hughes, R., Nordholt, J., Derkacs, D., Peterson, C.: Practical free-space quantum key distribution over 10km in daylight and at night. New journal of physics 4, 1–43 (2002), http://www.iop.org/EJ/abstract/1367-2630/4/1/343/
Labouret, G.: IPsec: présentation technique. Hervé Schauer Consultants (HSC) (2000), http://www.hsc.fr
Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283 (1999), http://arxiv.org/PS_cache/quant-ph/9803/9803006.pdf
Mason, A.: IPsec Overview Part Five: Security Associations. Cisco Press (2002), http://www.ciscopress.com/articles/printerfriendly.asp?p=25443
Mayers, D.: Unconditionnal Security in Quantum Cryptography. J. Assoc. Comput. Math. 48, 351 (1998)
Paterson, K.G., Piper, F., Schack, R.: Why Quantum Cryptography? (2004), http://eprint.iacr.org/2004/156.pdf
Riguidel, M., Dang-Minh, D., Le-Quoc, C., Nguyen-Toan, L., Nguyen-Thanh, M.: Quantum crypt- Work Package I. ENST/EEC/QC.04.06.WP1B (Secoqc partner) (2004)
Rivest, R.L., Shamir, A., Adleman, L.M.: A Method of Obtaining Digital Signature and Public-Key Cryptosystems. Communication of the ACM 21(2) (1978)
Wootters, W.K, Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802 (1982)
IdQuantique, A Quantum Leap for Cryptography (2004), http://www.idquantique.com/files/introduction.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghernaouti-Hélie, S., Sfaxi, M.A. (2007). Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment. In: Filipe, J., Coelhas, H., Saramago, M. (eds) E-business and Telecommunication Networks. ICETE 2005. Communications in Computer and Information Science, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75993-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-75993-5_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75992-8
Online ISBN: 978-3-540-75993-5
eBook Packages: Computer ScienceComputer Science (R0)