Abstract
Quantum key distribution (QKD) has evolved as a robust way of secret key distribution based on renowned modern physics concepts. To transmit sensitive information in the government, private, and personal sectors, high-security levels are now necessary. All conventional cryptographic algorithms applied in the communication models, which rely on mathematical models and conceptual assumptions, are unsecure. Thus, QKD systems are the best choice for protecting this information as a countermeasure since they provide unconditional security. In this paper, a design is proposed for the FSO channel using the CASCADE protocol under different atmospheric condition such as haze, rain and snow. The suggested framework’s effectiveness and security in the context of QKD with two non-orthogonal photon states are assessed. Simulation results of this model show the percentage of original sequence recovery; the number of errors removed, optical spectrum at transmitter and receiver for a base frame length of 104 bits. Moreover, Error correction is calculated per iteration to improve signal quality at the receiver side and compared to previous work. The calculated value in this article shows a better result. Hence, both the sender and the receiver could achieve a security key using this method.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
In this decade, secure communication platforms are an important requirement by the people and large industries to demand reliable data transmission via an open environment. Hence, a secure channel for communication must be implemented from sender to receiver to transmit the information [1]. Cryptography ensures the security and accuracy of data in the presence of threats in communication. An essential cryptography challenge in this is how to transfer a secret key from the sender to the recipient [2]. Generally, two types of encryption approaches are used: symmetric key and public-key cryptography [3].
QKD possesses the capability of secure communication, which is based on quantum mechanics instead of dubious assumptions about the present and prospective computational resources [4, 5]. QKD addresses the problem of key distribution without depending on the computational complexity of accomplishing such mathematical functions as one-way functions, which are studied as the backbone of public-key cryptography [6].
In QKD, let two communication entities are considered named Alice (sender) and Bob (receiver) transmit the data in the communication network. It allows both parties to identify an eavesdropper (Eve) and establish a secret key that is unknown to Eve.As shown in the Fig. 1, two communication channels are normally present in a QKD system: a quantum channel and an authenticated classical channel [7]. The function of a quantum channel or private channel is to transmit a single photon through a transparent optical path. It is a deterministic and lossy channel. Similarly, a classical channel can be a typical IP channel that relies on the system configuration for example any telephone line. It involves basic reconciliation, error correction, and privacy amplification protocols. By using these two channels a secret key can be obtained among Alice and Bob, which is known as prepare-and-measure protocols [8]. They must be able to limit the quantity of original data Eve can receive. There is a trade-off between the availability of data that Eve leaks and the amount of signal state disruption that can be created in any such attack [9].
In Fig. 1, the required sub-systems on Alice's sides are an optical device, quantum state preparation (QSP), a Digital Processor & Communication (DP&Comm) and the modulation scheme (Mod-Sch). By using quantum entanglement and transmitting the message in quantum states, a transmission system can be realized that identifies eve. Hence, the QSP subsystem is important to prepare a reliable quantum state that can be used for encryption [10]. DP&Comm subsystem uses different technologies for digital processing such as field-programmable gate array (FPGA), and graphical processing unit (GPU), to achieve the algorithm for monitoring Mod-Sch subsystem. It also uses classical communication links [11]. The output of QSP can be modified to drive the DP&Comm signal and then the information-carrying quantum state is conveyed through a quantum private channel.
An optical receiver on Bob's side obtains the quantum state and produces an electrical signal that is given into a demodulation scheme (Demod-Sch) with the help of several optical passive devices. Here, Bob has also the same DP&Comm subsystem as used in Alice. Then the signal passes through Quantum State Determination/Performance Parameters (QSD/PP) subsystem to determine the optical mode established by Bob. It calculates some performance factors obtained such as amplitude, phase, and polarization. Eve, on the other side, needs a variety of subsystems to "listen" the data from Alice and Bob [12].There are several approaches to achieve QKD over FSO such as protocol-based or entanglement-based.
In this paper, we have used a protocol-based FSO scheme. The QKD protocol specifies the procedure for defining a key, which is divided into three categories: the oldest and most widely used discrete-variable (BB84, B92, E91, SARG04), effective continuous-variable (CV-QKD) protocols, and distributed-phase-reference coding (COW, DPS) [13]. Bennett and Brassard proposed the first and vital protocol, BB84, in 1984, which utilizes four possible quantum modes. Linear polarization or a combination of linear and circular polarizations may be used in polarization-based systems [14].
In the past, Bennett et al. [15] demonstrated the first experimental analysis of quantum cryptography in 1992. Bennett suggested that signal photons interfering with photons communicating over maximum distances across optical fibres could be used to introduce a minimal QKD system, B92, in 1992. But it utilizes two non-orthogonal quantum states i.e., 0 for horizontal and 1 for polarized right circle state. Bennett depicts a hands-on interferometric realization using low-intensity coherent light pulses using two non-orthogonal quantum states. In [16], Brassard and Salvail realized the deficiency in signal transmission using the protocol BBBSS where it can allow only a fixed number of iterations. After the specified number of iterations, there is no certainty that all errors in the frame have been fixed. In [17], Liu et al. proposed a model where a general protocol has been implemented for both information reconciliation and advantage distillation. But due to high transmission overhead, the applications are limited for real-time QKD systems. In [18], Lodewyck et al. demonstrated a coherent-state reverse-reconciliation system using low-density parity-check (LDPC) codes over a 25 km span of fiber. But it produces low throughput. In [13], Scarani et al. discussed about the practical aspects of QKD as well as summarize the used tools to improve the security of data. In [19], Pedersen and Toyran exhibited the use of CASCADE protocol over optical fiber. The result also provides low throughput and low efficiency than LDPC code. In [20], Kamran et al. presented KMB09 based QKD system and its simulation based on the encrypted bits in higher-order Gaussian beam spatial modes. In [21], Cao et al. described the general network architecture and various protocols used in QKD. The system requirement is analysed in terms of flexibility, reliability, efficiency and interoperability. In [22], Patel et al. compared the existing techniques with the proposed model based on cost of communication and security index. It also explained the secure data transformation between user-device and device to device using an efficient key protocol.
The major contributions of this work are summarized in the following.
-
1.
A binary sequence is transmitted from Alice to Bob using linear and circular polarization of photons. The sequence is delivered by encoding 1 s and 0 s in the polarization of photons through FSO channel at various atmospheric turbulence condition.
-
2.
An error reconciliation protocol is used to transmit the sequence and generation of secret key using privacy amplification method.
-
3.
The number of errors remaining in the transmitted sequence, percentage of original sequence lost per number of iterations is calculated.
The rest of the paper is as follows: concept of the reconciliation process and privacy amplification is discussed in Sect. 2. Here, the use of CASCADE as an error reconciliation protocol is explained along with the initial two iterations of the reconciliation process. Section 3 describes the proposed method for the QKD system using simulation tools such as MATLAB and Opti system. The simulation results are analyzed in Sect. 4 and concluded in Sect. 5.
2 Proposed method
In the QKD process, the initial objective of Alice and Bob is to form a secret key of n bits. Hence, an N number of quantum signals are transmitted through a quantum channel and then communicate using a classical channel. Opti system is generally used as an optical simulator to design different optical networks. It can be used to simulate the QKD system with different photonics components [23]. The schematic diagram of the proposed QKD system is presented in Fig. 2, where two continuous-wave lasers with the operating frequency of 193.1 THz released light beams with an optical power of 10dBm into the channel. The signal is passing through an optical attenuator with an attenuation value of 0.1 dB to have a single photon. To ensure the state of polarization (SOP) linear and circular polarizers are used at the end of Alice. The ‘select’ component can be used as a polarized beam splitter(PBS) to select the incoming photons randomly. Here, the Free space optic link acts as a quantum channel. In the real world, when the signal transmission is performed by Eve then it introduces attenuation and errors as compared to the original signal [24]. The light beam propagating through the channel encounters the fluctuation known as turbulence [25]. Here, various atmospheric conditions are considered which affect the signal propagation from Alice to Bob. Two polarization analyzers (PA) are implemented to observe the trajectory of SOP on the Poincare sphere for secret key extraction at the transmitter and receiver side respectively. The switch is used to produce randomness in transferring the polarization of photons during transmission and reception using rectilinear or diagonal basis detection [26].
A simulation is a significant way in the study of communication networks. The simulation environment enables researchers to create complex network topologies, as well as a high level of control and repeatable studies, allowing them to perform experiments and validate their findings [27]. Hence, this proposed algorithm is programmed using MATLAB and Optisystem-15 software. The procedure of this proposed method is demonstrated as follows:
-
1.
Alice sends a sequence of random photon to Bob (Recipient).
Let n={n0, n1…nl} where n – number of quantum states and record the sequence of the states.
-
2.
Bob measures each state with probability of 50% after getting the quantum states.
-
3.
After transmission of N bits, Quantum transmission is stopped and then error reconciliation protocol is applied on both.
-
4.
Then Alice and Bob compute error Percentage using information reconciliation process. Let number of iterations is represented as iter. It follows these steps:
-
a.
Initialize iter, P
-
b.
For i in (1: iter)
-
Find num, the number of P-blocks
-
For j in (1:num)
Conduct parity check on Alice and Bob's respective blocks. If they match, remove the same bit from each block. Else, conduct a binary search to find an erroneous bit and remove it. For each iteration of the binary search, remove one bit as well.
-
Generate a random shuffling order, which is used to shuffle Alice and Bob’s sequences.
-
Double P
-
a.
-
5.
Both sides perform privacy amplification, to produce a series of final secret key.
A simplified flow chart is represented in Fig. 3 which describes the steps to follow the error correction using CASCADE protocol.
Again, the feasibility of the proposed model is demonstrated for a 1 km FSO channel at a various attenuation of 20 dB/km(haze), 30 dB/km (rain), and 40 dB/km (snow). The input polarization has been given as both linear and circular polarization to calculate the state of polarization (SOP) S0.
3 Simulation results
The performance of an error correction can be computed using different methods. The system parameters are estimated error rate, change in error estimation, reconciliation efficiency, bits exposed, percent bits exposed [28]. The used base frame length n = 104 bits. In the proposed method, the system efficiency is evaluated based on the number of errors remaining in the transmitted sequence, percentage of original sequence lost, number of bits removed per number of iterations. The comparison between the number of bits removed and the number of errors remaining is shown in Fig. 4 per iteration.
From the graph in Fig. 4a, b the black line presents number of bits removed and red line represents the remaining error.It can be visualized from the above results that, with each iteration, the number of remaining errors is reduced. In [29], the author proposed the modification depend on the length of the initial key and computed the error percentage. The use of the forward error correction method has been illustrated by [30] [31]. Here, the error correction per iteration using cascade protocol is evaluated in Table 1.
In [30], the author considered the error correction method using cascade protocol only for 4 iteration.But we proposed the error correction for the iteration of 15 and achieved the better result.Table 2 presents a comparative analysis of our work relative to [30].
The Poincare sphere analyzes the effect of eve on the signal transmission. On this sphere, each point represents a specific SOP. The SOP on the North pole represents the R-SOP and the South pole the L-SOP, while the equator line represents various linear SOPs such as H, V, D, and A [32]. The evolution of SOP and its corresponding parameter S0 concerning the FSO link is observed in Fig. 5. Here, the state of circular and linear polarizations is located at the poles and on the equator, respectively.
In Fig. 5, the parameter S0 calculated by considering the haze condition with attenuation of 20 dB/km. But the output is influenced by outdoor features such as attenuation, temperature variation, scattering [33]. The designed model provides stokes parameter value of 9.689 dBm, 9.499 dBm, and 8.921 dBm at haze, rain, and snow condition. It is observed that the SOP varied in different elliptical-polarized states as per the atmospheric turbulence condition. As the attenuation value increases, the value of stokes parameter reduces.
In addition, the frequency spectrum at the transmission side and receiver side are illustrated in Fig. 6 at various attenuation levels. A spectrum analyzer is a precision measuring tool that shows the power dispersion of a light source over a specific wavelength value. On the vertical scale, it shows power (dBm), and on the horizontal scale, it shows frequency (THz) [34]. The spectral components are derived at the center frequency of 193.1 THz. Because of the versatility of various spectral components, any spectral chip can be used as the center wavelength for modulating the user data stream [35]. The security of user information in conventional optical networks is enhanced because of this property of the optical spectrum.
Figure 6a, c, e represent the signal power is the same at transmission side that is 9.9 dBm. However, the spectral components as in Fig. 6b, d, f shows the decrease in signal power after the signal are attenuated by 20 dB/km, 30 dB/km, and 40 dB/km. It can be envisioned that the spectrum at the transmission and received side is highly correlated at 20 dB/km (Haze). However, with the increase in atmospheric turbulence the signal power reduces.
4 Conclusion
In this work, we have showed a quantum key distribution model using CASCADE protocol under the FSO channel. The system performance is analysed by evaluating the percentage of error correction in the transmitted signal, frequency spectra between sender and recipient. However, CASCADE is a standard for the error reconciliation phase in maximum QKD system but due to large binary search method, the efficiency can be further improved using LDPC and Winnow protocols. The capability of the network can be improved by reducing the information leakage and having low interaction between two parties. In future work, the improvements to the proposed idea can be implemented using Multi–Input–Multi–Output (MIMO) and Wavelength Division Multiplexing (WDM).
References
Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2001). Quantum cryptography. Reviews of Modern Physics, 74(1), 145–195. https://doi.org/10.1103/RevModPhys.74.145
Hughes, R. J., Buttler, W. T., Kwiat, P. G., Lamoreaux, S. K., Morgan, G. L., Nordholt, J. E., & Peterson, C. G. (2002). Free-space quantum cryptography. In Quantum Communication, Computing, and Measurement 2 (pp. 367–374). Kluwer Academic Publishers. https://doi.org/10.1007/0-306-47097-7_49
Boyer, M., Liss, R., & Mor, T. (2020). Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis. Theoretical Computer Science, 801, 96–109. https://doi.org/10.1016/j.tcs.2019.08.014
Rosenberg, D., Peterson, C. G., Harrington, J. W., Rice, P. R., Dallmann, N., Tyagi, K. T., & Nordholt, J. E. (2009). Practical long-distance quantum key distribution system using decoy levels. New Journal of Physics. https://doi.org/10.1088/1367-2630/11/4/045009
Zukarnain, Z. A., Buhari, A., Harun, N. Z., & Khalid, R. (2019). QuCCs: An experimental of quantum key distribution using quantum cryptography and communication simulator. Malaysian Journal of Mathematical Sciences, 13(S), 127–140.
Carrasco-Casado, A., Fernández, V., & Denisenko, N. (2016). Free-space quantum key distribution. In Optical Wireless Communications (pp. 589–607). Springer. https://doi.org/10.1007/978-3-319-30201-0_27
García-Martínez, M. J., Soto, D., Denisenko, N., & Fernández, V. (2011). Free-space quantum key distribution. Optica Pura y Aplicada, 44(2), 233–239. https://doi.org/10.1007/978-3-319-30201-0_27
Morris, J. D., Grimaila, M. R., Hodson, D. D., Jacques, D., & Baumgartner, G. (2014). A survey of quantum key distribution (QKD) technologies. In Emerging Trends in ICT Security (pp. 141–152). Elsevier. https://doi.org/10.1016/B978-0-12-411474-6.00009-8
Ferenczi, A., & Lütkenhaus, N. (2012). Symmetries in quantum key distribution and the connection between optimal attacks and optimal cloning. Physical Review A, 85(5), 052310. https://doi.org/10.1103/PhysRevA.85.052310
Aaron Lopez-Leyva, J., Talamantes-Alvarez, A., A. Ponce-Camacho, M., Garcia-Cardenas, E., & Alvarez-Guzman, E. (2019). Free-space-optical quantum key distribution systems: Challenges and trends. In Quantum Cryptography in Advanced Networks (pp. 1–14). IntechOpen. https://doi.org/10.5772/intechopen.81032
Conrad, A., Isaac, S., Cochran, R., Sanchez-Rosales, D., Wilens, B., Gutha, A., & Kwiat, P. (2021). Drone-based quantum key distribution: QKD. In Hemmati, H., & Boroson, D. M. (Eds.), Free-Space Laser Communications XXXIII (p. 29). SPIE. https://doi.org/10.1117/12.2582376.
Diamanti, E., Lo, H. K., Qi, B., & Yuan, Z. (2016). Practical challenges in quantum key distribution. npj Quantum Information. https://doi.org/10.1038/npjqi.2016.25
Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301–1350. https://doi.org/10.1103/RevModPhys.81.1301
Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560, 7–11. https://doi.org/10.1016/j.tcs.2014.05.025
Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121–3124. https://doi.org/10.1103/PhysRevLett.68.3121
Brassard, G., & Salvail, L. (1993). Secret-key reconciliation by public discussion. In Advances in Cryptology—EUROCRYPT ’93 (pp. 410–423). Springer. https://doi.org/10.1007/3-540-48285-7_35
Liu, S., Van Tilborg, H. C. A., & Van Dijk, M. (2003). A practical protocol for advantage distillation and information reconciliation. Designs, Codes, and Cryptography, 30(1), 39–62. https://doi.org/10.1023/A:1024755209150
Lodewyck, J., Bloch, M., García-Patrón, R., Fossier, S., Karpov, E., Diamanti, E., & Grangier, P. (2007). Quantum key distribution over 25 km with an all-fiber continuous-variable system. Physical Review A, 76(4), 042305. https://doi.org/10.1103/PhysRevA.76.042305
Pedersen, T. B., & Toyran, M. (2013). High performance information reconciliation for QKD with CASCADE. Quantum Information and Computation, 15(5), 419–434. https://doi.org/10.5072/ZENODO.16786
Kamran, M., Mubashir Khan, M., Malik, T., & Arfeen, A. (2020). Quantum key distribution over free space optic (FSO) channel using higher order Gaussian beam spatial modes. Turkish Journal of Electrical Engineering and Computer Sciences. https://doi.org/10.3906/elk-2005-49
Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The evolution of quantum key distribution networks: on the road to the Qinternet. IEEE Communications Surveys & Tutorials, 24(2), 839–894. https://doi.org/10.1109/COMST.2022.3144219
Patel, C., Bashir, A. K., AlZubi, A. A., & Jhaveri, R. H. (2022). EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element. Digital Communications and Networks. https://doi.org/10.1016/j.dcan.2022.11.001
Buhari, A., Zukarnain, Z. A., Subramaniam, S. K., Zainuddin, H., & Saharudin, S. (2012). An efficient modeling and simulation of quantum key distribution protocols using OptiSystem. In 2012 IEEE Symposium on Industrial Electronics and Applications (pp. 84–89). IEEE. https://doi.org/10.1109/ISIEA.2012.6496677
Kravtsov, K., Wang, Z., Trappe, W., & Prucnal, P. R. (2013). Physical layer secret key generation for fiber-optical networks. Optics Express, 21(20), 23756–23771. https://doi.org/10.1364/OE.21.023756
Sun, X., Djordjevic, I. B., & Neifeld, M. A. (2016). Secret key rates and optimization of BB84 and decoy state protocols over time-varying free-space optical channels. IEEE Photonics Journal, 8(3), 1–13. https://doi.org/10.1109/JPHOT.2016.2570000
Mohamed Halip, N. H., Mokhtar, M., & Buhari, A. (2015). Simulation of Bennet and Brassard 84 protocol with Eve’s attacks. In Proceedings of ICP 2014—5th International Conference on Photonics 2014, 29–31. https://doi.org/10.1109/ICP.2014.7002301
Dixon, A. R., & Sato, H. (2015). High speed and adaptable error correction for megabit/s rate quantum key distribution. Scientific Reports, 4(1), 7275. https://doi.org/10.1038/srep07275
Pacher, C., Grabenweger, P., Martinez-Mateo, J., & Martin, V. (2015). An information reconciliation protocol for secret-key agreement with small leakage. In 2015 IEEE International Symposium on Information Theory (ISIT) (pp. 730–734). IEEE. https://doi.org/10.1109/ISIT.2015.7282551
Yan, H., Ren, T., Peng, X., Lin, X., Jiang, W., Liu, T., & Guo, H. (2008). Information reconciliation protocol in quantum key distribution system. In 2008 Fourth International Conference on Natural Computation (pp. 637–641). IEEE. https://doi.org/10.1109/ICNC.2008.755
Mehic, M., Niemiec, M., Siljak, H., & Voznak, M. (2020). Error reconciliation in quantum key distribution protocols. In Lecture Notes in Computer Science (pp. 222–236). Springer, Cham. https://doi.org/10.1007/978-3-030-47361-7_11
Nakassis, A., Bienfang, J. C., & Williams, C. J. (2004). Expeditious reconciliation for practical quantum key distribution. In Donkor, E., Pirich, A. R., & Brandt, H. E. (Eds.), Quantum Information and Computation II; (2004) (p. 28). https://doi.org/10.1117/12.541698
Chen, J., Wu, G., Li, Y., Wu, E., & Zeng, H. (2007). Active polarization stabilization in optical fibers suitable for quantum key distribution. Optics Express, 15(26), 17928. https://doi.org/10.1364/oe.15.017928
Zhang, L., Hajomer, A. A. E., Yang, X., & Hu, W. (2019). Error-free secure key generation and distribution using dynamic Stokes parameters. Optics Express, 27(20), 29207. https://doi.org/10.1364/OE.27.029207
Taki, H., Azou, S., Hamie, A., Morel, P., Al Housseini, A., Alaeddine, A., & Sharaiha, A. (2018). Chirping techniques for enhancing the performance of SOA-based UWB over fiber systems: An experimental demonstration. AEU - International Journal of Electronics and Communications, 94, 221–225. https://doi.org/10.1016/j.aeue.2018.07.008
Singh, S., & Singh, S. (2017). Performance analysis of spectrally encoded hybrid WDM-OCDMA network employing optical orthogonal modulation format against eavesdropper. AEU—International Journal of Electronics and Communications, 82, 492–501. https://doi.org/10.1016/j.aeue.2017.10.003
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mallick, B., Parida, P., Nayak, C. et al. Quantum key distribution over FSO channel using error reconciliation protocol. Wireless Netw 29, 2161–2169 (2023). https://doi.org/10.1007/s11276-023-03289-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-023-03289-6