Iranian Journal of Information Processing and Management

Iranian Journal of Information Processing and Management

Quantum Cryptography in Telecommunications as a New Era of Secure Communications

Document Type : Original Article

Authors
1 Al-Turath University, Baghdad 10013, Iraq,
2 Al-Mansour University College, Baghdad 10067, Iraq
3 Osh State University, Osh City 723500, Kyrgyzstan
4 Al-Rafidain University College Baghdad 10064, Iraq
5 Madenat Alelem University College, Baghdad 10006, Iraq
Abstract
Background: Quantum Key Distribution (QKD) has turned into a crucial point for secure communication in the era of quantum networks. Quantum key distribution provides the client with a theoretically secure key by taking advantage of the principles of quantum mechanics to counteract what could be posed by quantum computing to classical cryptography. Photons are lost in the system and there are some limitations which don’t allow scalability and integration with already existing networks.
Objective: The study seeks to assess the viability of QKD systems, review some of the challenges associated with it, and investigate possible methods of utilizing both QKD and PQC to cope with new security threats in telecommunication industry.
Methods: An in-depth analysis was made based on the experimental observations of key generation rates, photon loss, error correction, data throughput, and latency. Performance of quantum repeaters was experimented with for the purposes of measuring distance improvement abilities. A combined QKD-PQC approach was assessed for integrated integration for restricted settings.
Results: QKD was seen to have high security and high performance in short distances and when quantum repeaters were implemented the distance could be greatly enhanced. In the QKD-PQC model, the rate of error correction, throughput, and scalability was noticed to be higher than in standalone QKD. Challenges that faced the work were photon loss, processing latency, and system vulnerabilities.
Conclusion: New opportunities for secure communication are opened with QKD supported by quantum repeaters and hybrid cryptographic approaches. The technical and operational issues need to be resolved to realize the potential role of B3G evolution in enabling global telecommunications for the mass market.
Keywords

References

Adu-Kyere, A., Nigussie, E., and Isoaho, J. (2022). Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3. Sensors, 22 (16). https://doi.org/:10.3390/s22166284.
Biswas, C., Haque, M. M., and Gupta, U. D. (2022). A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography.  IEEE Access, 10, 72743-72757. https://doi.org/:10.1109/ACCESS.2022.3188798
Chamola, V., Jolfaei, A., Chanana, V., Parashari, P., and Hassija, V. (2021). Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography. Computer Communications, 176, 99-118. https://doi.org/:10.1016/j.comcom.2021.05.019
Chen, Y.-A., Zhang, Q., Chen, T.-Y., Cai, W.-Q., Liao, S.-K., Zhang, J., Chen, K., et al. (2021). An integrated space-to-ground quantum communication network over 4,600 kilometres.  Nature, 589 (7841), 214-219. https://doi.org/:10.1038/s41586-020-03093-8
Diamanti, E. (2021). Secure communications in quantum networks. Proc. SPIE. https://doi.org/:10.1117/12.2603515.
Goyal, R., Pawar, A., Ravikumar, R., and Bitragunta, S. (2022). A Novel Hybrid Communication Policy using Network Coding Based Post-Quantum Cryptography and Fuzzy Inference System. IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 18-21 Dec. https://doi.org/:10.1109/ANTS56424.2022.10227752.
Hashim, K., Selyukov, A., Vlasenko, M., Lukova-Chuiko, N., and Khlaponin, Y. (2022). ALGORITHM OF THE LTE / 5G NETWORK BILLING SYSTEM WITH THE PROVISION OF INTERNET OF THINGS SERVICES.  Transactions of Kremenchuk Mykhailo Ostrohradskyi National University, 36-46. https://doi.org/:10.32782/1995-0519.2022.6.4
Kumar, R., Mazzoncini, F., Qin, H., and Alléaume, R. (2021). Experimental vulnerability analysis of QKD based on attack ratings.  Scientific Reports, 11 (1), 9564. https://doi.org/:10.1038/s41598-021-87574-4
Li, S., Chen, Y., Chen, L., Liao, J., Kuang, C., Li, K., Liang, W., et al. (2023). Post-Quantum Security: Opportunities and Challenges. Sensors, 23 (21). https://doi.org/:10.3390/s23218744.
Liu, W.-Z., Zhang, Y.-Z., Zhen, Y.-Z., Li, M.-H., Liu, Y., Fan, J., Xu, F., et al. (2022). Toward a Photonic Demonstration of Device-Independent Quantum Key Distribution.  Physical Review Letters, 129 (5), 050502. https://doi.org/:10.1103/PhysRevLett.129.050502
Ma, D., Liu, X., Huang, C., Chen, H., Lin, H., and Wei, K. (2021). Simple quantum key distribution using a stable transmitter-receiver scheme.  Optics Letters, 46 (9), 2152-2155. https://doi.org/:10.1364/OL.418851
Mushtaq, A.-S., Ali Ihsan, A.-A., and Qasim, N. (2015). 2D-DWT vs. FFT OFDM Systems in fading AWGN channels.  Radioelectronics and Communications Systems, 58 (5), 228-233. https://doi.org/:10.3103/S0735272715050052
Nandal, R., Nandal, A., Joshi, K., and Rathee, A. (2021). A Survey and Comparison of Some of the Most Prominent QKD Protocols. SSRN Electronic Journal. https://doi.org/:10.2139/ssrn.3769123
Qasim, N., and Fatah, O. (2022). The role of cyber security in military wars.  V International Scientific and Practical Conference: Problems of cyber security of information and telecommunication systems (PCSITS). October 27 - 28.  Kyiv, Ukraine.
Qasim, N., Khlaponin, Y., & Vlasenko, M. (2022). Formalization of the Process of Managing the Transmission of Traffic Flows on a Fragment of the LTE network.  Collection of Scientific Papers of the Military Institute of Taras Shevchenko National University of Kyiv, 75, 88–93. https://doi.org/:10.17721/2519-481X/2022/75-09
Qasim, N., and Pyliavskyi, V. (2020). Color temperature line: forward and inverse transformation.  Semiconductor physics, quantum electronics and optoelectronics, 23, 75-80. https://doi.org/:10.15407/spqeo23.01.075
Qasim, N. H., Vyshniakov, V., Khlaponin, Y., and Poltorak, V. (2021). Concept in information security technologies development in e-voting systems.  International Research Journal of Modernization in Engineering Technology and Science (IRJMETS), 3 (9), 40-54. https://www.irjmets.com/uploadedfiles/paper/volume_3/issue_9_september_2021/15985/final/fin_irjmets1630649545.pdf
Reiß, S. D., and van Loock, P. (2023). Deep reinforcement learning for key distribution based on quantum repeaters. Physical Review A, 108 (1), 012406. https://doi.org/:10.1103/PhysRevA.108.012406
Señor, J., Portilla, J., and Mujica, G. (2022). Analysis of the NTRU Post-Quantum Cryptographic Scheme in Constrained IoT Edge Devices.  IEEE Internet of Things Journal, 9 (19), 18778-18790. https://doi.org/:10.1109/JIOT.2022.3162254
Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., and Mishra, A. K. (2021). Quantum Key Distribution Secured Optical Networks: A Survey.  IEEE Open Journal of the Communications Society, 2, 2049-2083. https://doi.org/:10.1109/OJCOMS.2021.3106659
Solanki, D. B. S., Saini, A., and Saini, A. (2023). Review Paper on Quantum Computing and Quantum Cryptography.  International Journal of Advanced Research in Science, Communication and Technology.
Sultan, J., Osmadi, I., and Manap, Z. (2022). Real-time Wi-Fi network performance evaluation.  International Journal of Informatics and Communication Technology (IJ-ICT), 11, 193. https://doi.org/:10.11591/ijict.v11i3.pp193-205
Tupkary, D., and Lütkenhaus, N. (2023). Using Cascade in quantum key distribution.  Physical Review Applied, 20 (6), 064040. https://doi.org/:10.1103/PhysRevApplied.20.064040
Xiunan, S., and Hao, L. (2023). Implementation of encoder and decoder for low-density parity-check codes in continuous-variable quantum key distribution on a field programmable gate array.  Optical Engineering, 62 (1), 014105. https://doi.org/:10.1117/1.OE.62.1.014105
Yang, Y.-H., Li, P.-Y., Ma, S.-Z., Qian, X.-C., Zhang, K.-Y., Wang, L.-J., Zhang, W.-L., et al. (2021). All optical metropolitan quantum key distribution network with post-quantum cryptography authentication. Optics Express, 29 (16), 25859-25867. https://doi.org/:10.1364/OE.432944
Yousif, O., Dawood, M., Jassem, F. T., and Qasim, N. H. (2024). Curbing crypto deception: evaluating risks, mitigating practices and regulatory measures for preventing fraudulent transactions in the middle east.  Encuentros: Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico, (22), 311-334. https://doi.org/:10.5281/zenodo.13732337
Zeydan, E., Turk, Y., Aksoy, B., and Ozturk, S. B. (2022). Recent Advances in Post-Quantum Cryptography for Networks: A Survey. 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ), 26-27 Feb. 2022. https://doi.org/:10.1109/MobiSecServ50855.2022.9727214.