lim
N →∞
θ =
T
T + D
(11)
If we take the following configuration: the rate of
quantum key exchange is 1Mbit/s and the Internet
connection is 1Mbit/s, then T= 0.012 s and D = 0.04s.
T+V is greater than K (0.02 s). So, the effectiveness
θ if the number of packet N is infinite (11) is equal to
12/52 = 23 % of the total performance.
4 CONCLUSION
Classical cryptography algorithms are based on math-
ematical functions. The robustness of a given cryp-
tosystem is based essentially on the secrecy of its (pri-
vate) key and the difficulty with which the inverse of
its one-way function(s) can be calculated. Unfortu-
nately, there is no mathematical proof that will es-
tablish whether it is not possible to find the inverse
of a given one-way function. On the contrary, quan-
tum cryptography is a method for sharing secret keys,
whose security can be formally demonstrated.
As we have seen, using quantum cryptography in
conjonction with IPsec to offer a better level of se-
curity for organisations is possible. If, we apply the
quantum key exchange and one-time-pad function,
we reach the unconditional security in communica-
tion. The distillation of the quantum key could be
done in two different ways: over the optical chan-
nel or over the public channel. The cost of installing
this solution stills expensive nowadays. The perfor-
mance obtained when distilling the key over the op-
tical channel is higher than when using public chan-
nel (up to 100% when using optical channel versus
23% when using public channel). Actually, we can
reach 100Kbit/s when exchanging the quantum key
and hope to reach 1Mbit/s next few years. The possi-
ble flow rate over an optical fiber is 100Mb/s. If, we
use an Internet connection of 1Mbit/s, we get 60% of
the total performance (solution1, a) i.e. a flow rate
of 600Kbit/s if the distillation of the key is done over
the optical channel and we get only 23% of the to-
tal performance if we validate the key over the public
channel (solution 2, b) i.e. a flow rate of 230Kbit/s. If
we could reach the rate of 10Mbit/s in quantum key
exchange and we use the first solution, we will get a
performance of 100% in the flow rate i.e. 1Mbit/s.
ACKNOWLEDGEMENT
This work has been done within the framework
of the European research project : SECOQC -
www.secoqc.net. We would like to thank IDQuan-
tique S.A (www.idquantique.com) and specially Gre-
goire Ribordy and Olivier Gay for their help and use-
ful information.
REFERENCES
Ghernaouti-H
´
elie, S; Sfaxi, M.A; Hauser, A; Riguidel,
M;All
´
eaume, R (2004). “Business model: advan-
tages, scenarios, patents and laws related to quantum
cryptography”. Secoqc project deliverable.
All
´
eaume R (2004). “R
´
ealisation exp
´
erimentale de sources
de photons uniques, caract
´
erisation et application
`
a la
cryptographie quantique” (Secoqc partner)
Bennet, C; Brassard, G (1983). IEEE International Confer-
ence on Computers, Systems, and Signal Processing.
IEEE Press, LOS ALAMITOS
Bennet, (1992). C Quantum Cryptography: Uncertainty in
the Service of Privacy. Science 257.
Donald S.Bethune and William P.Risk (2002).
”AutoCompensating quantum cryptography”.
New journal of physics 4 (2002)42.1-42.15
URL: http://www.iop.org/EJ/article/1367-
2630/4/1/342/nj2142.html
Clark, C. W; Bienfang, J. C; Gross, A. J; Mink, A; Her-
shman, B. J; Nakassis, A; Tang, X; Lu, R; Su, D. H;
Williams, C. J; Hagley E. W; Wen, J (2000). ”Quan-
tum key distribution with 1.25 Gbps clock synchro-
nization”, Optics Express.
Artur Ekert (1991). “Quantum Cryptography based on
Bell’s Theorem”. Physical Review Letters. URL:
http://prola.aps.org/abstract/PRL/v67/i6/p661
1
Elliott, C (2002). ”Building the quantum network”. New
Journal of Physics 4 (46.1-46.12)
Elliott, C; Pearson, D; Troxel, G (2003). ”Quantum Cryp-
tography in Practice”.
Freebsd people. ”IPsec outline”. URL:
http://people.freebsd.org/˜julian/
IPsec
4 Dummies.html
freesoft (2004). ”IPsec Overview”. URL:
http://www.freesoft.org/CIE/Topics/141.htm
Gisin, N; Ribordy, G; Tittel, W; Zbinden, H. (2002).
”Quantum Cryptography”. Reviews of Modern
Physics 74 (2002): http://arxiv.org/PS
cache/quant-
ph/pdf/0101/0101098.pdf
Grosshans,Van Assche, Wenger,Brouri,Cerf,Grangier
(2003). ”Quantum key distribution using gaussian-
modulated coherent states” Letter to nature. URL:
http://www.mpq.mpg.de/Theorygroup/CIRAC-
/people/grosshans/papers/Nat421
238.pdf
R.Hughes,J.Nordholt,D.Derkacs,C.Peterson, (2002).
”Practical free-space quantum key distribu-
tion over 10km in daylight and at night”. New
journal of physics 4 (2002)43.1-43.14.URL:
http://www.iop.org/EJ/abstract/1367-2630/4/1/343/
Labouret, G (2000). ”IPsec: pr
´
esentation technique”. Herv
´
e
Schauer Consultants (HSC). URL : www.hsc.fr
GUARANTEERRING SECURITY OF FINANCIAL TRANSACTION BY USING QUNATUM CRYPTOGRAPHY IN
BANKING ENVIRONMENT
273