Font Size: a A A

Design And Implementation Of Authentication Scheme For Quantum Key Distribution System Base On FPGA

Posted on:2021-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:X L NingFull Text:PDF
GTID:2370330611999419Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Quantum Key Distribution(QKD)technology is a technology that generates and shares a secure key between Alice and Bob over long distance communications by transmitting Quantum states.QKD consists of quantum state transmission/measurement on quantum channel and classical post-processing on common communication channel.The security of QKD is mainly based on the Heisenberg uncertainty principle of quantum mechanics and the unclonability theorem of unknown quantum states.In addition,the public communication channel is required to be a certified channel.In order to satisfy this condition,a complete QKD system must include an unconditional security authentication module.In this paper,a FPGA-based QKD system authentication scheme is designed and implemented:Firstly,some main authentication algorithms are studied,and a authentication algorithm suitable for FPGA,which is based on Toeplitz Hash,is selected and simulated on Matlab.According to the experimental results,the feasibility of the algorithm is verified.Then,hardware design is carried out based on Toeplitz Hash authentication algorithm,and hardware circuit of the whole algorithm module is designed using Verilog HDL language,including algorithm control module,LFSR random number generation module and algorithm auxiliary operation module.The hardware simulation of the whole algorithm module shows that the module can effectively complete the core functions of the authentication algorithm.Finally,a complete QKD authentication protocol is designed.Aiming at the key synchronization problem in authentication,a classic authentication protocol based on convention is designed.In this protocol,the authentication key is only used once and then discarded.Aiming at this problem,according to the theory of circular key,an authentication protocol based on circular key is designed.In addition,the key technologies of protocol scheduling strategy,protocol packet strategy and protocol reliability in protocol design are also studied.In this paper,two authentication protocols are simulated and compared on Matlab to verify the feasibility and advantages of the circular key authentication scheme.
Keywords/Search Tags:QKD, Authentication, FPGA, Toeplitz hash
PDF Full Text Request
Related items