跳到主要內容

臺灣博碩士論文加值系統

(44.220.184.63) 您好!臺灣時間:2024/10/08 08:30
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:傅思源
研究生(外文):Fu, Szu-Yuan
論文名稱:量子通訊加密系統
論文名稱(外文):量子通訊加密系統
指導教授:周耀新
指導教授(外文):Chou,Yao-Hsin
口試委員:王思齊林其誼郭奕宏周耀新
口試日期:20110726
學位類別:碩士
校院名稱:國立暨南國際大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2011
畢業學年度:99
語文別:英文
論文頁數:33
中文關鍵詞:量子加密密碼表量子通訊一次性密碼本單次金鑰使用密碼法一次一密量子位元
外文關鍵詞:Quantum biquantum encryptionpassword tablesquantum communicationone-time padone-time password book
相關次數:
  • 被引用被引用:0
  • 點閱點閱:407
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
設計一個通訊系統,能被適用於大部分不同種類的量子位元雛形。遷就現有的科學技術,達到一個可運行的通訊加密系統。這系統希望達到One-time Pad的安全等級:
1. 隨機性
利用測量量子位元狀態時,若各狀態基底的系數大小相同,則各狀態被測量到的機率都相同,最終測量值為各種狀態公平的隨機挑選。
2. 無限長度的密碼對照表
每一個量子位元,被測量過後需要重新校正,而這校正的依據是根據當次的測量值決定。不斷的測量與校正,也不斷地產生新的量子位元狀態(新的編碼);因此,量子位元可以不斷地改變,密碼對照表也不斷地改變,相當於無限長度的密碼對照表。

  雙方同步變動更新密碼表內容
 每一個加密單元使用過後,將隨機改變
 對應欄位的加密單元,會有相同的改變
 同步的方法是依據相同的變化機率

  雖然synchronous one-time Pad的欄位數目有現實的限制,但是每個欄位經過指令操作後會有變化;synchronous one-time Pad使用過後,又會變成不同原先的表,達到編碼符號對應具有隨機性,變化規則又不重複的設計目標。

We want to design a communication system which can be applied to most of the different types of quantum-bit prototype. By the existing science and technology, our communications encryption system can be made. The system hopes to achieve One-time Pad security level:
1. random
If each base factor of the quantum bit state is the same, we will get the same probability value of every different quantum bit measured base. It means that the selection of quantum bit base is random.
2. the unlimited length password table
Quantum bit need to be corrected after each measured action, and this way of correction is based on the last measured value. Every measuring and calibration also brings up a new state of quantum bits (new code). Therefore, as the quantum bit is changed constantly, the password table is constantly changing. This is the equivalent of an infinite length password table.

  The content of synchronous one-time Pad
 The encryption unit will be random changed after each using it.
 Every encryption unit of the same fence has the same change.
 The method of synchronization is according to the same probability of change.

  Although there are practical number limitations of fence in the "synchronous one-time Pad, " but the fence will be changed after the operation. After using synchronous one-time Pad, the pad will turn into a different pad from original one. It approaches to our design goals of the random corresponding coded symbols without repeating.


誌謝 (ACKNOWLEDGEMENT)……………………………I
摘要(CHINESE ABSTRACT)……………………………II
ABSTRACT……………………………………………………III
目錄頁(CONTENTS)…………………………………………IV
圖次頁(LIST OF FIGURES) …………………………………V
CHAPTER 1導論 (INTRODUCTION)………………………1
1.1相關背景(BACKGROUND)………………………………1
1.2研究目的(STUDY PURPOSE)-……………………………2
CHAPTER 2系統架構 (ARCHITECTURE OF SYSTEM)… 3
2.1設計目的(DESIGN OBJECTIVE)…………………………3
2.2 SYNCHRONOUS ONE-TIME PAD ……………………4
CHAPTER 3運作機制(OPERATING MECHANISM)………6
3.1系統指令(SYSTEM COMMANDS)………………………6
3.2一般指令(GENERAL COMMANDS)……………………7
CHAPTER 4模擬操作 (SIMULATION OPERATION)……25
4.1模擬過程 (PROCESS)…………………………………25
4.2分析模擬 (SIMULATION ANALYSIS)…………………29
CHAPTER 5結論(CONCLUSION)………………………30
CHAPTER 6 參考資料(REFERENCE)…………………31

[1]Quantum Computing, Part 1 , Andrew Glassner, Andrew Glassner’s Notebook, IEEE Computer Graphics and Applications,July/August 2001

[2]Quantum Computing, Part 2 , Andrew Glassner, Andrew Glassner’s Notebook, IEEE Computer Graphics and Applications,September/October 2001

[3]Quantum Computing, Part 3 , Andrew Glassner, Andrew Glassner’s Notebook, IEEE Computer Graphics and Applications,November/December 2001

[4]Application of Quantum Seal heory on Quantum Repeaters Guang Ping He School of Physics & Engineering and Advanced Research Center, Sun Yat-sen University, Guangzhou 510275, China

[5]Practical cryptography / Niels Ferguson, Bruce Schneier

[6]近代網路安全與編碼機制原理.實作 / 鍾慶豐編著

[7]Quantum computing / Jozef Gruska

[8]Feynman lectures on computation, Richard Feynman / Addison-Wesley Publishing Company

[9]Taking the quantum leap – the new physics for nonscientists, Fred Alan Wolf / New York: Harper & Row, Publishers.

[10]A shortcut through time: a path to the quantum computer, George Johnson / Alfred A. Knopf

[11]M.A. Nielsen and I.L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, Cambridge, 2000)

[12]Schrodinger’s kittens – and the search for reality, John Gribbin / London: Weidenfeld & Nicolson

[13]The ghost in the atom, P. Davies, J. Brown / Cambridge University Press

[14]The Feynman Processor, Gerard Milburn / Reading Massachusetts: Perseus Books

[15]The strange world of quantum mechanics, Daniel F. Styer / Cambridge University Press

[16]Quantum computing and communications / Michael Brooks (ed.) , Michael , 1970-

[17]Nano, quantum, and molecular computing : implications to high level design and validation / / Sandeep K. Shukla, R. Iris Bahar.

[18]Problems & solutions in quantum computing & quantum information / Willi-Hans Steeb, Yorick Hardy.

[19]Post-quantum cryptography / edited by Nicolas Sendrier

[20]Entanglement and decoherence : foundations and modern trends / edited by Andreas Buchleitner, Carlos Viviescas, Markus Tiersch

[21]Holevo, A.S. (1973), 『Bounds for the quantity of information transmitted by a quantum communication channel』, Problemy Peredachi Informatsii, 9(3): 3–11. English translation in Problems of Information Transmission, 9: 177–183, 1973.

[22]Peter Shor, Algorithms for Quantum Computation: Discrete Logarithms and Factoring, IEEE Symposium on Foundations of Computer Science 124-134(1994)



QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top