H04L9/0852

QUANTUM RESISTANT SECURE KEY DISTRIBUTION IN VARIOUS PROTOCOLS AND TECHNOLOGIES
20230014894 · 2023-01-19 ·

A quantum resistant method is provided for supporting user equipment (UE) roaming across APs/eNBs/gNBs belonging to various Wireless LAN Controllers (WLCs) in enterprise 5G and WiFi co-located deployments. The method may include initializing a SKS server in an electrical communication with a master WLC with a random post-quantum common secret seed (PQSEED) to generate a post-quantum pre-shared key (PQPSK) and a respective PQPSK-ID. The method may also include sending an encrypted PQSEED along with a PQPSK-ID to a second WLC. The method may further include joining AP (WiFi) to the master WLC using a CAPWAP/DTLS protocol. The method may further include sending the PQPSK-ID from the master WLC to the UE in an EAP success packet when the UE is associated with the AP (WiFi).

CONTINUOUS-VARIABLE QUANTUM TELEPORTATION USING MICROWAVE ENABLED PLASMONIC GRAPHENE WAVEGUIDE

A electronic method, includes receiving, by a graphene structure, a microwave signal. The electronic method further includes receiving, by the graphene structure, two optical signals. The electronic method further includes generating, by the graphene structure, an entanglement between two optical signals and the microwave signal. The electronic method includes teleporting an unknown coherent state based on the entanglement.

Quantum code for reduced frequency collisions in qubit lattices

A quantum computer includes a quantum processor that includes a first plurality of qubits arranged in a hexagonal lattice pattern such that each is substantially located at a hexagon apex, and a second plurality of qubits each arranged substantially along a hexagon edge. Each of the first plurality of qubits is coupled to three nearest-neighbor qubits of the second plurality of qubits, and each of the second plurality of qubits is coupled to two nearest-neighbor qubits of the first plurality of qubits. Each of the second plurality of qubits is a control qubit at a control frequency. Each of the first plurality of qubits is a target qubit at one of a first target frequency or a second target frequency. The quantum computer includes an error correction device configured to operate on the hexagonal lattice pattern of the plurality of qubits so as to detect and correct data errors.

Method and device for recognizing blinding attacks in a quantum encrypted channel
11700109 · 2023-07-11 · ·

A receiver for recognizes blinding attacks in a quantum encrypted channel having an optical fiber. The receiver includes a multipixel detector having a plurality of pixels, and configured to be illuminated by a light beam outputted by the optical fiber. A processing unit connects to the multipixel detector and is configured to determine the presence of a blinding attack if a predetermined number of pixels detects light within a predetermined interval. The receiver recognizes blinding attacks in a quantum encrypted channel and implements a method for recognizing blinding attacks in a quantum encrypted channel.

Receiver for Verification using Entangled Photons

A method of generating a verification code includes measuring a time of arrival and a corresponding first or second state value of a plurality of first photons and a plurality of second photons, where respective ones of the plurality of first photons are entangled with respective ones of a plurality of second photons in a first basis, which is time, and entangled in a second basis. A first and a second ordered list of the measured times of arrival of the plurality of respective first and second photons is generated. Time-of-arrival matches between the first ordered list and the second ordered list are determined. First or second state values that correspond to the determined time-of-arrival matches between the first ordered list and the second ordered list are determined. A verification code using some of the determined first or second state values that correspond to the determined time-of-arrival matches is generated.

SYSTEM AND METHOD FOR PROTECTING CONVENTIONAL QUANTUM KEY DISTRIBUTION PROTOCOLS
20230216671 · 2023-07-06 ·

A system with methods to enhance key strength for a quantum shared key which is derived by a conventional quantum key distribution protocol and the system provides a single optical communication channel with security protection mechanism for key distribution without relying on an authenticated public classical channel. The system is implemented with technology in combination of key-strength enhancement, re-encoding operation, density-matrix verification, and grating control for a single optical communication channel where the system can be integrated with a conventional Quantum-Key-Distribution protocol such as BB84 or B92, but excluding GHz-clocked QKD system. Thereby, the system can help a known QKD system to overcome current drawbacks of an apparatus implemented over a conventional QKD protocol so as to derive an enhanced quantum shared key.

SYSTEMS, METHODS, AND DEVICES FOR ENCRYPTED DATA TRANSFER

A network interface controller includes processing circuitry configured to pair with a local root of trust of a host device connected to the network interface controller and provide a key to an encryption device of the host device that enables the encryption device to encrypt data of one or more host device applications using the key. The encrypted data are stored in host device memory. The processing circuitry is configured to share the key with a remote endpoint and forward the encrypted data from the host device memory to the remote endpoint.

SYSTEM AND METHOD FOR COMBINING MIMO AND MODE-DIVISION MULTIPLEXING
20230006719 · 2023-01-05 ·

A communications system comprises a maximum ratio combining (MRC) circuit for receiving a plurality of input data streams and for processing the plurality of input data streams using maximum ration combining to improve signal to noise ratio. A MIMO transmitter transmits the MRC processed carrier signal over a plurality of separate communications links from the MIMO transmitter, each of the plurality of separate communications links from one transmitting antenna of a plurality of transmitting antennas to each of a plurality of receiving antennas at a MIMO receiver.

SYSTEMS, METHODS, AND DEVICES FOR ENCRYPTED DATA TRANSFER

A network interface controller includes processing circuitry configured to pair with a local root of trust of a host device connected to the network interface controller and provide a key to an encryption device of the host device that enables the encryption device to encrypt data of one or more host device applications using the key. The encrypted data are stored in host device memory. The processing circuitry is configured to share the key with a remote endpoint and forward the encrypted data from the host device memory to the remote endpoint.

Time division quadrature homodyne CV QKD system

Disclosed is a time division quadrature homodyne CV QKD system, and a continuous variable quantum key distribution system which includes: a transmitter generating an optical pulse of quantum state data by using continuous light according to data of a transmission target encryption key; and a receiver separating the optical pulse received from a channel into two paths and fixing phases of two signals having a time difference of one period of the optical pulse to orthogonal phases, and then generating bit information through state detection by a time division homodyne detection from interacted signals.