{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T23:07:16Z","timestamp":1770419236316,"version":"3.49.0"},"reference-count":26,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T00:00:00Z","timestamp":1598832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100005770","name":"Wyoming Space Grant Consortium","doi-asserted-by":"publisher","award":["80NSSC19K1577"],"award-info":[{"award-number":["80NSSC19K1577"]}],"id":[{"id":"10.13039\/100005770","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>The ability to send information securely is a vital aspect of today\u2019s society, and with the developments in quantum computing, new ways to communicate have to be researched. We explored a novel application of quantum key distribution (QKD) and synchronized chaos which was utilized to mask a transmitted message. This communication scheme is not hampered by the ability to send single photons and consequently is not vulnerable to number splitting attacks like other QKD schemes that rely on single photon emission. This was shown by an eavesdropper gaining a maximum amount of information on the key during the first setup and listening to the key reconciliation to gain more information. We proved that there is a maximum amount of information an eavesdropper can gain during the communication, and this is insufficient to decode the message.<\/jats:p>","DOI":"10.3390\/cryptography4030024","type":"journal-article","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T08:11:19Z","timestamp":1598861479000},"page":"24","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Chaotic Quantum Key Distribution"],"prefix":"10.3390","volume":"4","author":[{"given":"Noah","family":"Cowper","sequence":"first","affiliation":[{"name":"Department of Physics and Astronomy, University of Wyoming, Laramie, WY 82071, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7241-3793","authenticated-orcid":false,"given":"Harry","family":"Shaw","sequence":"additional","affiliation":[{"name":"NASA Goddard Space Flight Center, Greenbelt, MD 20771, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8087-292X","authenticated-orcid":false,"given":"David","family":"Thayer","sequence":"additional","affiliation":[{"name":"Department of Physics and Astronomy, University of Wyoming, Laramie, WY 82071, USA"}]}],"member":"1968","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"key":"ref_2","first-page":"175","article-title":"Public Key Distribution and Coin Tossing","volume":"1","author":"Bennett","year":"1984","journal-title":"Int. Conf. Comput. Syst. Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","article-title":"Unconditional Security in Quantum Cryptography","volume":"48","author":"Mayers","year":"2001","journal-title":"J. ACM"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/TIT.2002.807289","article-title":"Proof of Security of Quantum Key Distribution with Two-Way Classical Communications","volume":"49","author":"Gottesman","year":"2003","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Renner, R., Gisin, N., and Kraus, B. (2005). Information-Theoretic Security Proof for Quantum-Key-Distribution Protocols. Phys. Rev. A, 72.","DOI":"10.1103\/PhysRevA.72.012332"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure Quantum Key Distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photonics"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Chen, C., Zhuang, Q., Wong, F.N.C., and Shapiro, J.H. (2018). Experimental Quantum Key Distribution at 1.3 gigabit-per-second Secret-key Rate over a 10 dB loss channel. Quantum Sci. Technol., 3.","DOI":"10.1364\/CLEO_QELS.2018.FTu3G.5"},{"key":"ref_8","first-page":"431","article-title":"Security of quantum key distribution using weak boherent states with nonrandom phases","volume":"8","author":"Lo","year":"2007","journal-title":"Qant. Inf. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"44.1","DOI":"10.1088\/1367-2630\/4\/1\/344","article-title":"Quantum Key distribution with realistic states: Photon number statistics in the photon number splitting attack","volume":"4","author":"Lutkenhaus","year":"2002","journal-title":"New J. Phys."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wang, X. (2005). Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography. Phys. Rev. Lett., 94.","DOI":"10.1103\/PhysRevLett.94.230503"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Lo, H., Ma, X., and Chen, K. (2005). Decoy State Quantum Key Distribution. Phys. Rev. Lett., 94.","DOI":"10.1103\/PhysRevLett.94.230504"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hwang, W. (2003). Quantum Key Distribution with High Loss: Toward Global Secure Communications. Phys. Rev. Lett., 91.","DOI":"10.1103\/PhysRevLett.91.057901"},{"key":"ref_13","unstructured":"Mahmud, N., El-Araby, E., Shaw, H., and Cooper, L. (2018, January 19\u201320). Securing and auto-synchronizing communication over free-space optics using quantum key distribution and chaotic systems. Proceedings of the Quantum Communications and Quantum Imaging XVI, San Diego, CA, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1103\/PhysRevLett.64.821","article-title":"Synchronization in Chaotic Systems","volume":"64","author":"Pecora","year":"1990","journal-title":"Phys. Rev. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Pljonkin, A., and Singh, P.K. (2018, January 20\u201322). The Review of the Commercial Quantum Key Distribution System. Proceedings of the 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), Himachal Pradesh, India.","DOI":"10.1109\/PDGC.2018.8745822"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Pljonkin, A., Rumyantsev, K., and Singh, P.K. (2017). Synchronization in Quantum Key Distribution. Cryptography, 1.","DOI":"10.3390\/cryptography1030018"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/ncomms13984","article-title":"Chip-based Quantum Key Distribution","volume":"8","author":"Sibson","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/3-540-48285-7_35","article-title":"Secret-Key Reconciliation by Public Discussion","volume":"765","author":"Brassard","year":"1994","journal-title":"Lect. Notes Comput."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Marinez-Mateo, J., Pacher, C., Peev, M., Ciurana, A., and Martin, V. (2014). Demystifing the Information Reconciliation Protocol Cascade. arXiv.","DOI":"10.26421\/QIC15.5-6-6"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1109\/81.246145","article-title":"Taming Chaos-Part I: Synchronization","volume":"40","author":"Ogorzalek","year":"1993","journal-title":"IEEE Tans. Circuits Syst. II"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1017\/S0305004100064926","article-title":"The Hausdorff dimension of self-affine fractals","volume":"103","author":"Falconer","year":"1988","journal-title":"Math. Proc. Camb. Philos. Soc."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wu, J., Jin, X., Mi, S., and Tang, J. (2020). An Effective Method to Compute the Box-Counting Dimension Based on the Mathematical Definition and Intervals. Results Eng., 6.","DOI":"10.1016\/j.rineng.2020.100106"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1103\/PhysRevLett.50.346","article-title":"Characterization of Strange Attractors","volume":"50","author":"Grassberger","year":"1983","journal-title":"Phys. Rev. Lett."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Yan, H., Ren, T., Peng, X., Lin, X., Jiang, W., Liu, T., and Guo, H. (2008, January 18\u201320). Information Reconciliation Protocol in Quantum Key Distribution System. Proceedings of the 2008 Fourth International Conference on Natuaral Computation, Jinan, China.","DOI":"10.1109\/ICNC.2008.755"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"do Nascimento, J.C., Damasceno, R.L.C., de Oliveria, G.L., and Ramos, R.V. (2019). Quantum-chaotic key distribution in optical networks from secrecy to implementation with logistic map. Quantum Inf. Process, 17.","DOI":"10.1007\/s11128-018-2097-1"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alvarez, G., and Li, S. (2006). Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. Int. J. Bifurc. Chaos, 16.","DOI":"10.1142\/S0218127406015970"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/3\/24\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:05:08Z","timestamp":1760177108000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/4\/3\/24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,31]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["cryptography4030024"],"URL":"https:\/\/doi.org\/10.3390\/cryptography4030024","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,31]]}}}