tailieunhanh - Ebook Telecommunications networks – Current status and future trends: Part 2

(BQ) Part 2 book “Telecommunications networks – Current status and future trends” has contents: Quantum secure telecommunication systems, routing and traffic engineering in dynamic packet-oriented networks, on the fluid queue driven by an ergodic birth and death process, and other contents. | 9 Quantum Secure Telecommunication Systems Oleksandr Korchenko1, Petro Vorobiyenko2, Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1 2Odessa 1National Aviation University National Academy of Telecommunication named after . Popov Ukraine Our scientific field is still in its embryonic stage. It's great that we haven't been around for two thousands years. We are still at a stage where very, very important results occur in front of our eyes Michael Rabin 1. Introduction Today there is virtually no area where information technology (ІТ) is not used in some way. Computers support banking systems, control the work of nuclear power plants, and control aircraft, satellites and spacecraft. The high level of automation therefore depends on the security level of IT. The main features of information security are confidentiality, integrity and availability. Only providing these all gives availability for development secure telecommunication systems. Confidentiality is the basic feature of information security, which ensures that information is accessible only to authorized users who have an access. Integrity is the basic feature of information security indicating its property to resist unauthorized modification. Availability is the basic feature of information security that indicates accessible and usable upon demand by an authorized entity. One of the most effective ways to ensure confidentiality and data integrity during transmission is cryptographic systems. The purpose of such systems is to provide key distribution, authentication, legitimate users authorisation, and encryption. Key distribution is one of the most important problems of cryptography. This problem can be solved with the help of (SECOQC White Paper on Quantum Key Distribution and Cryptography, 2007; Korchenko et al., 2010a): • • Classical information-theoretic schemes (requires channel with noise; efficiency is very low, 1–5%). Classical public-key cryptography schemes (Diffie-Hellman scheme, .

TÀI LIỆU LIÊN QUAN