Enhancing the security of image transmission in Quantum era: A Chaos-Assisted QKD Approach using entanglement

Raiyan Rahman,Md Shawmoon Azad,Mohammed Rakibul Hasan,Syed Emad Uddin Shubha,M.R.C.Mahdy
2023-11-30
Abstract:The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of optical communications. This research addresses these challenges by innovatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach utilizes the unpredictability of chaotic systems alongside the robust security mechanisms inherent in quantum entanglement. The scheme is further fortified with an eavesdropping detection mechanism based on CHSH inequality, thereby enhancing its resilience against unauthorized access. Through quantitative simulations, we demonstrate the effectiveness of this scheme in encrypting images, achieving high entropy and sensitivity to the original images. The results indicate a significant improvement in encryption and decryption efficiency, showcasing the potential of the scheme as a viable solution against the vulnerabilities posed by quantum computing advancements. Our research offers a novel perspective in secure optical communications, blending the principles of chaos theory with QKD to create a more robust cryptographic framework.
Quantum Physics,Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to enhance the security of image transmission in the era of quantum computing. Specifically, with the development of quantum computers, traditional encryption algorithms are facing unprecedented security challenges, especially in the field of optical communication. This research proposes a new secure image - transmission scheme by innovatively combining quantum key distribution (QKD) technology, especially the E91 protocol, with the Logistic Map in the chaotic system. This scheme utilizes the unpredictability of the chaotic system and the inherent security mechanism of quantum entanglement to improve the efficiency and security of image encryption. In addition, this scheme also introduces an eavesdropping detection mechanism based on the CHSH inequality, further enhancing the security of the system. ### Main Problems 1. **Threats of Quantum Computing to Traditional Encryption Algorithms**: The development of quantum computing enables algorithms such as Shor's algorithm to efficiently crack traditional encryption algorithms based on large - number factorization, such as RSA. This causes the future security of traditional encryption methods to be seriously threatened. 2. **Security Challenges in Optical Communication**: In optical communication, how to ensure the security of data transmission under the threat of quantum computing is an important issue. 3. **Combination of Chaotic Systems and Quantum Communication**: How to combine the complexity and unpredictability of chaotic systems with quantum communication technology to create a more powerful encryption framework. ### Solutions 1. **Quantum Key Distribution (QKD)**: Use the E91 protocol for quantum key distribution, and utilize the basic principles of quantum entanglement and quantum mechanics (such as the no - cloning theorem and the uncertainty principle) to ensure the security of key transmission. 2. **Chaotic Systems**: Introduce the Logistic Map to generate chaotic parameters, which are used in the image encryption and decryption processes, increasing the complexity and security of the system. 3. **Eavesdropping Detection Mechanism**: Design an eavesdropping detection mechanism based on the CHSH inequality, which can detect any unauthorized access during the key transmission process. ### Main Contributions 1. **Propose a New Framework**: Successfully combine the E91 QKD protocol and the Logistic Map for secure image transmission. 2. **Utilize the E91 Protocol**: As a key distribution protocol, use the principles of quantum mechanics to enhance the security of key transmission. 3. **Enhance the Security and Robustness of the Communication System**: By introducing the Logistic Map, improve the overall security and robustness of the communication system. 4. **Evaluate Performance and Reliability**: Evaluate the performance and reliability of the proposed scheme through end - to - end encryption security measurements. ### Experimental Results The experimental results show that this scheme can achieve high entropy and high sensitivity to the original image when encrypting images, significantly improving the efficiency of encryption and decryption. These results indicate that this scheme has great potential in应对 the security challenges brought by quantum computing, providing a new solution for future secure data transmission.