**4. Acknowledgment**

Special thanks should be given to **Rector of National Aviation University (Kyiv, Ukraine) – Mykola Kulyk.** We would not have finished this chapter without his support.

## **5. References**


Other secure quantum technologies in practice have not been extended beyond laboratory experiments yet. But there are many theoretical cryptographic schemes that provide high information security level up to the information-theoretic security. QSDC protocols remove the secret key distribution problem because they do not use encryption. One of these is the ping-pong protocol and its improved versions. These protocols can provide high information security level of confidential data transmission using the existing level of technology with security amplification methods. Another category of QSDC is protocols with transfer qubits by blocks that have unconditional security, but these need a large quantum memory which is out of the capabilities of modern technologies today. It must be noticed that QSDC protocols are not suitable for the transfer of a high-speed flow of confidential data because there is low data transfer rate in the quantum channel. But when a high information security level is more important than transfer rate, QSDC protocols should

Quantum secret sharing protocols allow detecting eavesdropping and do not require data encryption. This is their main advantage over classical secret sharing schemes. Similarly, quantum stream cipher and quantum digital signature provide higher security level than classical schemes. Quantum digital signature has information-theoretic security because it uses quantum one-way function. However, practical implementation of these quantum

Thus, in recent years quantum technologies are rapidly developing and gradually taking their place among other means of information security. Their advantage is a high level of security and some properties, which classical means of information security do not have. One of these properties is the ability always to detect eavesdropping. Quantum technologies therefore represent an important step towards improving the security of telecommunication systems against cyber-terrorist attacks. But many theoretical and practical problems must be solved for wide practical use of quantum secure

Special thanks should be given to **Rector of National Aviation University (Kyiv, Ukraine) –** 

Alekseev, D.A. & Korneyko, A.V. (2007). Practice reality of quantum cryptography key

Bennett, C. & Brassard, G. (1984). Quantum cryptography: public key distribution and coin

Bennett, C. (1992). Quantum cryptography using any two non-orthogonal states, *Physical* 

Bennett, C.; Bessette, F. & Brassard, G. (1992). Experimental Quantum Cryptography, *Journal* 

tossing, *Proceedings of the IEEE International Conference on Computers, Systems and* 

**Mykola Kulyk.** We would not have finished this chapter without his support.

distribution systems, *Information Security*, No. 1, pp. 72–76.

*Signal Processing*. Bangalore, India, pp. 175–179.

*Review Letters*, Vol.68, No.21, pp. 3121–3124.

*of Cryptography*, Vol.5, No.1, pp. 3–28.

technologies is also faced to some technological difficulties.

find its application.

telecommunication systems.

**4. Acknowledgment** 

**5. References** 


Quantum Secure Telecommunication Systems 233

Imai, H. & Hayashi, M. (2006). *Quantum Computation and Information. From Theory to* 

Imre, S. & Balazs, F. (2005). *Quantum Computing and Communications: An Engineering* 

Inamori, H.; Rallan, L. & Vedral, V. (2001). Security of EPR-based quantum cryptography

Kaszlikowski, D.; Christandl, M. et al. (2003). Quantum cryptography based on qutrit Bell

Koashi, M. & Imoto, N. (1997). Quantum Cryptography Based on Split Transmission of

Kollmitzer, C. & Pivk, M. (2010). Applied Quantum Cryptography, *Lecture Notes in Physics* 

Korchenko, O.G.; Vasiliu, Ye.V. & Gnatyuk, S.O. (2010a). Modern quantum technologies of

Korchenko, O.G.; Vasiliu, Ye.V. & Gnatyuk, S.O. (2010b). Modern directions of quantum

Korchenko, O.G.; Vasiliu, Ye.V.; Nikolaenko, S.V. & Gnatyuk, S.O. (2010c). Security

Li, X.H.; Deng, F.G. & Zhou, H.Y. (2006). Improving the security of secure direct

Lin, S.; Wen, Q.Y.; Gao, F. & Zhu F.C. (2008). Quantum secure direct communication with

Liu, Y.; Chen, T.-Y.; Wang, J. et al. (2010). Decoy-state quantum key distribution with polarized photons over 200 km, *Optics Express*, Vol. 18, Issue 8, pp. 8587-8594. Lomonaco, S.J. (1998). A Quick Glance at Quantum Cryptography, *arXiv:quant-*

Lütkenhaus, N. & Jahma, M. (2002). Quantum key distribution with realistic states: photon-

Lütkenhaus, N. & Shields, A. (2009). Focus on Quantum Cryptography: Theory and Practice,

Nair, R. & Yuen, H. (2007). On the Security of the Y-00 (AlphaEta) Direct Encryption

number statistics in the photon-number splitting attack, *New Journal of Physics*,

chi-type entangled states, *Physical Review A*, Vol.78, No.6, 064304.

against incoherent symmetric attacks, *Journal of Physics A*, Vol.34, No.35, pp. 6913–

One-Bit Information in Two Steps, *Physical Review Letters*, Vol.79, No.12, pp.

information security against cyber-terrorist attacks, *Aviation.* Vilnius: Technika,

cryptography, *"AVIATION IN THE XXI-st CENTURY" – "Safety in Aviation and Space Technologies": IV World Congress: Proceedings* (September 21–23, 2010), Кyiv,

amplification of the ping-pong protocol with many-qubit Greenberger-Horne-Zeilinger states, *XIII International Conference on Quantum Optics and Quantum Information (ICQOQI'2010):* Book of abstracts (May 28 – June 1, 2010), pp. 58–59. Li, Q.; Chan, W. H. & Long, D-Y. (2009). Semi-quantum secret sharing using entangled

communication based on the secret transmitting order of particles. *Physical Review* 

*Experiment*. Berlin: Springer-Verlag, Heidelberg, 235 p.

inequalities, *Physical Review A*, Vol.67, No.1, 012310.

*Approach,* John Wiley & Sons Ltd, 304 p.

*797*. Berlin, Heidelberg: Springer, 214 p.

6918.

2383–2386.

Vol.14, No.2, pp. 58–69.

NAU, pp. 17.1–17.4.

states, *arXiv:quant-ph/0906.1866v3*.

*A*, Vol.74, No.5, 054302.

*ph*/9811056*.*

Vol.4, pp. 44.1–44.9.

*New Journal of Physics*, Vol.11, No.4, 045005.

Protocol, *arXiv:quant-ph/0702093v2.* 


Deng, F. G.; Li, X. H.; Zhou, H. Y. & Zhang, Z. J. (2005). Improving the security of multiparty

Desurvire, E. (2009). *Classical and Quantum Information Theory*. Cambridge: Cambridge

Durt, T.; Kaszlikowski, D.; Chen, J.-L. & Kwek, L.C. (2004). Security of quantum key distributions with entangled qudits, *Physical Review A*, Vol.69, No.3, 032313. Ekert, A. (1991). Quantum cryptography based on Bell's theorem, *Physical Review Letters*,

Elliot, C.; Pearson, D. & Troxel, G. (2003). Quantum Cryptography in Practice, *arXiv:quant-*

Fuchs, C.; Gisin, N.; Griffits, R. et al. (1997). Optimal Eavesdropping in Quantum

Gao, T.; Yan, F.L. & Wang, Z.X. (2005). Deterministic secure direct communication using

Gao, F.; Guo, F.Zh.; Wen, Q.Y. & Zhu, F.Ch. (2008). Comparing the efficiencies of different

Gisin, N.; Ribordy, G.; Tittel, W. & Zbinden, H. (2002). Quantum cryptography, *Review of* 

Gnatyuk, S.O.; Kinzeryavyy, V.M.; Korchenko, O.G. & Patsira, Ye.V. (2009). *Patent* 

Goldenberg, L. & Vaidman, L. (1995). Quantum Cryptography Based On Orthogonal States,

Hillery, M.; Buzek, V. & Berthiaume, A. (1999). Quantum secret sharing, *Physical Review A*,

Hirota, O. & Kurosawa, K. (2006). An immunity against correlation attack on quantum

Hirota, O.; Sohma, M.; Fuse, M. & Kato, K. (2005). Quantum stream cipher by the Yuen 2000

Holevo, A.S. (1977). Problems in the mathematical theory of quantum communication

Hughes, R.; Nordholt, J.; Derkacs, D. & Peterson, C. (2002). Practical free-space quantum

Huttner, B.; Imoto, N.; Gisin, N. & Mor, T. (1995). Quantum Cryptography with Coherent

protocol: Design and experiment by an intensity-modulation scheme, *Physical* 

key distribution over 10 km in daylight and at night, *New Journal of Physics*, Vol.4,

stream cipher by Yuen 2000 protocol, *arXiv:quant-ph/0604036v1.*

channels, *Report of Mathematical Physics*, Vol.12, No.2, pp. 273–278.

States, *Physical Review A*, Vol.51, No.3, pp. 1863–1869.

Gottesman, D. & Chuang, I. (2001). Quantum digital signatures, *arXiv:quant-ph/0105032v2*. Hayashi, M. (2006). *Quantum information. An introduction.* Berlin, Heidelberg, New York:

*Mathematical and Theoretical*, Vol. 38, No.25, pp. 5761–5770.

*Mechanics & Astronomy*, Vol.51, No.12. pp. 1853–1860.

*Physical Review Letters*, Vol.75, No.7, pp. 1239–1243.

*Modern Physics*, Vol.74, pp. 145–195.

Cryptography. Information Bound and Optimal Strategy, *Physical Review A*, Vol.56,

GHZ-states and swapping quantum entanglement. *Journal of Physics A:* 

detect strategies in the ping-pong protocol, *Science in China, Series G: Physics,* 

No 43779 UA, MPK H04L 9/08. System for cryptographic key transfer,

044302.

*ph/0307049.*

25.08.2009.

Springer, 430 p.

43 p.

Vol.59, No.3, pp. 1829–1834.

*Review A*, Vol.72, No.2, 022335.

University Press, 691 p.

Vol.67, No.6, pp. 661–663.

No.2, pp. 1163–1172.

quantum secret sharing against Trojan horse attack, *Physical Review A*, Vol.72, No.4,


Quantum Secure Telecommunication Systems 235

Vasiliu, E.V. (2011). Non-coherent attack on the ping-pong protocol with completely

Vasiliu, E.V. & Nikolaenko, S.V. (2009). Synthesis if the secure system of direct message

Vasiliu, E.V. & Mamedov, R.S. (2008). Comparative analysis of efficiency and resistance

Vasiliu, E.V. & Vorobiyenko, P.P. (2006). The development problems and using prospects of

Vedral, V. (2006). *Introduction to Quantum Information Science*. Oxford University Press Inc.,

Wang, Ch.; Deng, F.G. & Long G.L. (2005a). Multi – step quantum secure direct

Wang, Ch. et al. (2005b). Quantum secure direct communication with high dimension quantum superdense coding, *Physical Review A*, Vol.71, No.4, 044305. Wang, J.; Zhang, Q. & Tang, C. (2006). Quantum signature scheme with single photons,

Wen, X.-J. & Liu, Y. (2005). Quantum Signature Protocol without the Trusted Third Party,

Williams, C.P. (2011). *Explorations in quantum computing, 2nd edition*. Springer-Verlag London

Wooters, W.K. & Zurek, W.H. (1982). A single quantum cannot be cloned, *Nature*, Vol. 299,

Xiu, X.-M.; Dong, L.; Gao, Y.-J. & Chi F. (2009). Quantum Secure Direct Communication with

Yan, F.-L.; Gao, T. & Li, Yu.-Ch. (2008). Quantum secret sharing protocol between

Yin, Z.-Q.; Zhao, Y.-B.; Zhou Z.-W. et al. (2008). Decoy states for quantum key distribution based on decoherence-free subspaces, *Physical Review A*, Vol.77, No.6, 062326. Yuen, H.P. (2001). *In Proceedings of QCMC'00*, Capri, edited by P. Tombesi and O. Hirota

Zhang, Zh.-J.; Li, Y. & Man, Zh.-X. (2005a). Improved Wojcik's eavesdropping attack on

Zhang, Zh.-J.; Li, Y. & Man, Zh.-X. (2005b). Multiparty quantum secret sharing, *Physical* 

Four-Particle Genuine Entangled State and Dense Coding, *Communication in* 

multiparty and multiparty with single photons and unitary transformations,

ping-pong protocol without eavesdropping-induced channel loss, *Physics Letters A*,

*telecommunications named after O.S. Popov*, No.2, pp. 20–27.

*telecommunications named after O.S. Popov*, No.1, pp. 3–17.

*Communications*, Vol. 253, No.1, pp. 15–20.

*Optoelectronics Letters*, Vol.2, No.3, pp. 209–212.

*Theoretical Physics*, Vol.52, No.1, pp. 60–62.

New York: Plenum Press, p. 163.

Vol.341, No.5–6, pp. 385–389.

*Review A*, Vol.71, No.4, 044301.

*Chinese Physics Letters*, Vol.25, No.4, pp. 1187–1190.

202.

No.1, pp. 83–91.

New York, 183 p.

*arXiv:quant-ph/0509129v2*.

Limited, 717 p.

p. 802.

entangled pairs of qutrits, *Quantum Information Processing,* Vol.10, No.2, pp. 189–

transfer based on the ping–pong protocol of quantum communication, *Scientific works of the Odessa national academy of telecommunications named after O.S. Popov*,

against not coherent attacks of quantum key distribution protocols with transfer of multidimensional quantum systems, *Scientific works of the Odessa national academy of* 

quantum cryptographic systems, *Scientific works of the Odessa national academy of* 

communication using multi – particle Greenberger – Horne – Zeilinger state, *Optics* 


<http://www.magiqtech.com/MagiQ/Products.html>.


Navascués, M. & Acín, A. (2005). Security Bounds for Continuous Variables Quantum Key

Nielsen, M.A. & Chuang, I.L. (2000). *Quantum Computation and Quantum Information.*

Ostermeyer, M. & Walenta N. (2008). On the implementation of a deterministic secure

Overbey, J; Traves, W. & Wojdylo J. (2005). On the keyspace of the Hill cipher, *Cryptologia*,

Peng, C.-Z.; Zhang, J.; Yang, D. et al. (2007). Experimental long-distance decoy-state

Pirandola, S.; Mancini, S.; Lloyd, S. & Braunstein S. (2008). Continuous-variable quantum

Qin, S.-J.; Gao, F. & Zhu, F.-Ch. (2007). Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol, *Physical Review A*, Vol.76, No.6, 062324.

<http://www.toshiba-europe.com/research/crl/QIG/quantumkeyserver.html>.

Rosenberg, D. et al. (2007). Long-distance decoy-state quantum key distribution in optical

Sangouard, N.; Simon, C.; de Riedmatten, H. & Gisin, N. (2011). Quantum repeaters based

Scarani, V.; Acin, A.; Ribordy, G. & Gisin, N. (2004). Quantum cryptography protocols

Scarani, V.; Bechmann-Pasquinucci, H.; Nicolas J. Cerf et al. (2009). The security of

SECOQC White Paper on Quantum Key Distribution and Cryptography. (2007). *arXiv:quant-*

Schumacher, B. & Westmoreland, M. (2010). *Quantum Processes, Systems, and Information*.

Terhal, B.M.; DiVincenzo, D.P. & Leung, D.W. (2001). Hiding bits in Bell states, *Physical* 

implementations, *Physical Review Letters*, Vol.92, No.5, 057901.

Shaw, B. & Brun, T. (2010). Quantum steganography, *arXiv:quant-ph/1006.1934v1.* 

Cambridge: Cambridge University Press, 469 p.

*review letters,* Vol.86, issue 25, pp. 5807-5810.

on atomic ensembles and linear optics, *Review of Modern Physics,* Vol.83, pp. 33–

robust against photon number splitting attacks for weak laser pulse

practical quantum key distribution, *Review of Modern Physics,* Vol.81, pp. 1301–

coding protocol using polarization entangled photons, *Optics Communications*,

quantum key distribution based on polarization encoding, *Physical Review Letters*,

cryptography using two-way quantum communication, *Nature Physics*, Vol.4, No.9,

NIST. "FIPS-197: Advanced Encryption Standard." (2001). 01.10.2011, Available from:

NIST. "FIPS-46-3: Data Encryption Standard." (1999). 01.10.2011, Available from:

Distribution, *Physical Review Letters*, Vol.94, No.2, 020505.

Cambridge: Cambridge University Press, 676 p.

QKS. Toshiba Research Europe Ltd. 01.10.2011, Available from:

QPN Security Gateway (QPN–8505). 01.10.2011, Available from: <http://www.magiqtech.com/MagiQ/Products.html>.

fiber, *Physical. Review Letters*, Vol.98, No.1, 010503.

<http://csrc.nist.gov/publications/fips>.

<http://csrc.nist.gov/publications/fips>.

Vol. 281, No.17, pp. 4540–4544.

Vol.29, No.1, pp. 59–72.

Vol.98, No.1, 010505.

pp. 726–730.

34.

1350.

*ph/0701168v1*.


**10** 

*México* 

**Web-Based Laboratory** 

**Using Multitier Architecture** 

Actuality, Internet provides a convenient way to develop a new communication technology for several applications, for example remote laboratories. The remote access to complex and expensive laboratories offers a cost-effective and flexible means for distance learning, research and remote experimentation. In the literature, some works propose platforms based on the Internet in order to access experimental laboratories; nevertheless it is necessary that the platform provides a good architecture, clear methodology of operation, and it must facilitate the integration between hardware (HW) and software (SW) elements. In this work, we present a platform based on "multitier programming architecture" which allows the easy integration of HW and SW elements and offers several schemes of tele-

The remote access to complex and expensive laboratory equipment represents an appealing issue and great interest for research, learning education and industrial applications. The range potentially involved is very large, including among others, applications in all fields of

It is well known that several experimental platforms are distributed in different laboratories in the world, and all of them are on-line accessible through the Internet. Since those laboratories require specific resources to enable a remote access, several solutions for harmonizing the necessary software and hardware have been proposed and described. Furthermore, due to their versatility, these platforms provide user services which allow the transmission of information in a simply way, besides being available to many people,

The potentiality of remote laboratories (Gomez & Garcia, 2007) and the use of the Internet, as a channel of communication to reach the students at their homes, were soon recognized (Basigalup et al., 2006; Davoli et al., 2006; Callangan et al., 2005; Imbre & Spong, 2006;

Several works based on remote experimentation, which are used as excellent alternatives to

access remote equipment, have been published (Costas et al., 2008).

presence: teleoperation, telecontrol and teleprogramming.

engineering (Restivo et al., 2009; Wu et al., 2008).

having many multimedia resources.

Rapuano & Soino, 2005).

**1. Introduction** 

C. Guerra Torres and J. de León Morales *Facultad de Ingenieria Mecánica y Eléctrica Universidad Autónoma de Nuevo León* 

