{"title":"量子密钥集成到数据网络中的一般原理第1部分","authors":"A. Pljonkin, Alexander Gorbunov","doi":"10.1109/ICCT46177.2019.8969011","DOIUrl":null,"url":null,"abstract":"In this paper, we have considered the examples of classical cryptography. Here we describe ciphers and classical encryption and decryption algorithms. We specify the basic methods and evolution vectors for cryptography and cryptanalysis. We also outline the basic principles of quantum cryptography. You may see how quantum key distribution system works as well as the main types of attacks on quantum communication systems. We have described the quantum key distribution system interaction with hardware encrypter. During this research, we have conducted a review of the requirements for the stability of the developed quantum key integration algorithm","PeriodicalId":118655,"journal":{"name":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The General Principles of Quantum Key Integration into Data Network Part 1\",\"authors\":\"A. Pljonkin, Alexander Gorbunov\",\"doi\":\"10.1109/ICCT46177.2019.8969011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we have considered the examples of classical cryptography. Here we describe ciphers and classical encryption and decryption algorithms. We specify the basic methods and evolution vectors for cryptography and cryptanalysis. We also outline the basic principles of quantum cryptography. You may see how quantum key distribution system works as well as the main types of attacks on quantum communication systems. We have described the quantum key distribution system interaction with hardware encrypter. During this research, we have conducted a review of the requirements for the stability of the developed quantum key integration algorithm\",\"PeriodicalId\":118655,\"journal\":{\"name\":\"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"volume\":\"97 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT46177.2019.8969011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT46177.2019.8969011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The General Principles of Quantum Key Integration into Data Network Part 1
In this paper, we have considered the examples of classical cryptography. Here we describe ciphers and classical encryption and decryption algorithms. We specify the basic methods and evolution vectors for cryptography and cryptanalysis. We also outline the basic principles of quantum cryptography. You may see how quantum key distribution system works as well as the main types of attacks on quantum communication systems. We have described the quantum key distribution system interaction with hardware encrypter. During this research, we have conducted a review of the requirements for the stability of the developed quantum key integration algorithm