0% found this document useful (0 votes)
41 views

Implementation of Socket Programming Simulation Using Quantum Communication Technologies

This document discusses implementing socket programming simulation using quantum communication technologies. It first provides background on classical socket programming and issues with delays and data losses. The authors then discuss how quantum technologies may help solve these problems by allowing for faster and more secure communication. They simulate quantum socket programming between two ports using quantum teleportation and super-dense coding. The results are compared to classical socket programming. Overall, the document examines how quantum computing could enhance socket programming communication by offering stronger security compared to classical encryption algorithms.

Uploaded by

Showribabu Kanta
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

Implementation of Socket Programming Simulation Using Quantum Communication Technologies

This document discusses implementing socket programming simulation using quantum communication technologies. It first provides background on classical socket programming and issues with delays and data losses. The authors then discuss how quantum technologies may help solve these problems by allowing for faster and more secure communication. They simulate quantum socket programming between two ports using quantum teleportation and super-dense coding. The results are compared to classical socket programming. Overall, the document examines how quantum computing could enhance socket programming communication by offering stronger security compared to classical encryption algorithms.

Uploaded by

Showribabu Kanta
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Implementation of Socket Programming Simulation

Using Quantum Communication Technologies

Elif Özceylan Cumali Yaşar Baktygul Assanova


Computer Engineering Information Technology Information Technology
İstanbul Arel University Kh.Dosmukhamedov Atyrau University Kh.Dosmukhamedov Atyrau University
İstanbul, Turkey Atyrau, Kazakhstan Atyrau, Kazakhstan
[email protected] [email protected] [email protected]
2022 International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) | 978-1-6654-7013-1/22/$31.00 ©2022 IEEE | DOI: 10.1109/ISMSIT56059.2022.9932779

Abstract— Using socket programming, which plays a major As in all kinds of communication, one of the most
role in the communication between devices and people, data is important elements in communication using socket
transmitted instantly over predetermined ports. By the programming is the security of communication. Today,
evolution of technology, the size of the data is increasing due to classical security protocols and encryption algorithms, which
the increase in the quality of the data. As a result, there are allow us to provide confidentiality and security during
losses and delays in data transfers. According to the research, it communication, give great deficits against the principle of
is assumed that applications and systems to be developed using confidentiality at the point where technology has come. The
quantum technologies will be useful in solving these problems. vulnerability is much higher in methods that use wireless
In this study, firstly information was given about the mechanism
networks such as socket programming. The reason for this is
in classical socket programming and the problems encountered
in this mechanism. Then, by giving information about quantum
that security measures exist within the hardware infrastructure
communication and the methods used in this communication, in wired networks, and limited hardware resources and power
the quantum solutions to these problems were examined, the units are available in wireless networks. These reasons make
application was coded in the quantum programming language systems using the wireless network highly vulnerable to DOS
and the communication between two ports with quantum socket and many attacks.
programming was simulated. The results obtained from this The security key sizes provided by the symmetric and
simulation was compared with the classically obtained results. asymmetric encryption algorithms need to constantly increase
Communication simulation between sockets was performed
to increase security against attacks that develop by
using teleportation and super-dense coding in quantum
computers.
themselves.
In classical algorithms, keys encrypt the message and send
Keywords— Quantum Communication, Quantum Computers, it to the client via the channel. The keys used for security in
Quantum Socket Programming, Instant Data Transmission, Port quantum encryption algorithms are randomly generated and
component instead of encrypting and sending the message, it uses the key
I. INTRODUCTION to generate the message on the client side without transmitting
it through the channel. The information sent to the client is the
Socket Programming refers to the technique of performing key information, not the message itself[5].
instant communication between two systems, the client and
the server, over the TCP/IP protocol, and allows a single II. SOCKET PROGRAMMING
computer to serve many different clients at once[1]. Socket Socket programming is a programming technique used to
programming plays a major role in areas such as drone manage communication between client and server. It
communication, inter-device communication, and the internet communicates using TCP/IP or UDP protocol. The socket
of things. In these areas, it is very important that the data goes structure in socket programming consists of an IP address and
from the server to the client without delay and safely. Owing port. These two elements come together to form a socket end,
to the increasing complexity of the systems used, the increase then communicate with other socket ends. The basis of the
in data sizes, the decrease in the sending speed, and the socket programming concept is the Socket API determined by
increase in system attacks, it is of great importance to offer Berkeley Sockets. To establish communication between the
innovative approaches to situations where the currently used server and client computers, both computers must open the
socket programming is missing or insufficient[2]. Recent socket paths with the socket function[3], [6].
research and studies by companies working in the academic
and quantum fields have shown that quantum technologies
will provide acceleration and security increase over classical
methods[3], [4].
Contrary to classical computers, quantum computers can
handle multiple states simultaneously. States 0 and 1 in
classical computers can be processed in parallel, including all
possibilities between states 0 and 1 simultaneously in quantum
computers. In this way, quantum computers can perform
multiple operations simultaneously. As a result, a much higher
communication and processing speed is achieved compared to
classical computers.

978-1-6654-7013-1/22/$31.00 ©2022 IEEE


1007
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
Functions using in socket communication are explained
below.
Socket() function is used to create the socket.
Bind() function creates a socket-end by combining the
created socket with selected port.
Connect() function realizes the connection.
Listen() function listens on the specified port.
Accept() function accepts the client trying to connect to
the listening port with the Listen() function.
Send() function sends the data after accepting the client
with the Accept() function.
Recv() function provides to get the data.
Close() function uses to close the socket connection after
all processes are finished.
B. Socket Programming in Quantum Communication
Fig. 1. Example of communication between clients and The greatest revolution in Quantum Computers is the
service via socket ends[7].
process of transferring, processing, and transforming data into
Socket Programming is used for simultaneous transactions information. Particularly, the first starting point of quantum
such as messaging applications, and online games. Moreover, physics was realized with the behavior of subatomic particles
application-level protocols such as FTP, SMTP, and POP3 use capable of managing data. The theories put forward by Claude
socket programming to establish a connection and transmit Elwood Shannon for the transfer of knowledge have pioneered
data. Many applications that are phenomena today use socket developments in this field.
programming logic. It is predicted that quantum computers will use classical
computers as control tools in the future. Processing and
A. Socket Programming in Classical Communication
finalization of data in classical computers will be done by
Communication between computers and data transfer quantum computers and displayed on users' screens again
takes place within the framework of certain rules. These rules through classical computers.
make up the protocols. All the rules that control the release,
packaging, transmission path and forwarding of data to be sent The management and data transfer of other classical
to the network are called network protocol. computers connected to quantum computers will be between
the ports. Especially the entanglement feature of quantum
computers will eliminate the concept of connection limit in
data transfer.
For Quantum Computers, each node symbolizes a user.
This number of connections is limited in classical computers.
However, for quantum computers, this limit would be almost
unlimited.
Socket programming for Quantum Computers gains great
importance in applications such as instant messaging, phone
calls, web interface access, the regular transmission of
information, smart city applications, and IoT applications.
The SSL socket used in data transmission in classical
computers is usually made from a special port called 443.
Nevertheless, quantum computers will not have this
limitation. All-access ports will be capable of using this
feature.
Especially for quantum mobile communication, quantum
socket programming has become a great need and necessity.
In particular, Socket programming techniques will improve in
terms of multimedia, audio, video communication quality, and
power of mobile devices.
Fig. 2. Connection-oriented communication model using The most important requirement of Quantum Socket
sockets[8]. programming is protocols and methods to be used in data
transfer for peer-to-peer communication. Security and correct
The socket ends shown in fig. 1 communicate through the delivery of data transfers over entanglement-based protocols
socket functions shown in fig. 2 depend on quantum socket programming.

1008
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
In smart city applications, data comes from mobile
devices, cameras in the city, or sensors on objects.
Management of each port of this can be done by quantum
socket programming.
Socket programming is also an important requirement for
cloud computing. Multi-cloud technologies using in today,
depending on the development of quantum technologies. Any
transaction made in the Amazon cloud would also occur in the
Microsoft cloud at the same time, the studies on this subject
will be done with quantum socket programming.
Today, the transmission of e-mails is provided with socket
programming. In classical computers, this process is realized
with access ports such as 110, 465, 993. In quantum socket
programming, this transmission would be made with ports that
are more secure and have no limitations.
In the structure of Superconductor computers, sensor
technologies are used to access the output. Programming of
sensors can be done with socket programming techniques in
quantum computers as well as in classical computers.
III. QUANTUM COMPUTERS
Quantum computers make calculations and other
operations based on quantum physics and mechanics, and use
small units of matter to manipulate information. (Atomic and
subatomic particles, photons, etc.). The smallest and most
basic unit of quantum computers is the qubit(Qbit). Qubit is a
quantum system consisting of a binary system, symbolized by Fig. 3. Representation of classical and quantum bits on
coordinate system[9].
two states as |0⟩ and |1⟩. These two cases are represented by
the bracket notation Dirac defined, and each corresponds to a
Quantum computers are separated into universal and non-
column vector. States in (1) represent the polarization state of
universal.
atoms and subatomic particles or photons. The equational
expression of a qubit is shown in (2). Universal quantum computers are a type of quantum
computer that will emerge, in theory, by combining the power
1 0
|0⟩ = 0
ve |1⟩ = 1
(1) of classical computers and quantum computers. There is no
universal quantum computer currently in use.
| ⟩ | ⟩ | ⟩ (2) Non-universal quantum computers are a type of quantum
computer developed to solve a specific problem. It performs
According to quantum mechanics, the position and their operations by using different systems (photonic, ion,
momentum information of a particle cannot be accessed at the spin, superconductor, etc.). Today, quantum computers used
same time. The function must consist of complex numbers so in applications such as high computation and simulations
that one value cannot be known while the other is known. developed by giant technology companies (IBM, Xanadu,
Therefore, α and β values consist of complex numbers. The Google, etc.) are known as non-universal quantum
value α2 indicates the probability that |µ> is found based on computers[10]. Following the searches, the number of qubits
|0>; the value of β2 shows the probability of finding |µ> on the used in computers is increasing day by day, and the processing
basis of |1>. According to the laws of physics, the sum of two capacity of quantum computers increase.
values is always equal to the real number 1 as shown in (3).

1 (3)

Fig. 4. Circuit of the working principle of the Photonic


Quantum Computer of the Xanadu company[11].

A. Superposition in Quantum Communication


The fact that a quantum system is in more than one state at
the same time shows that system is in superposition. The
angular momentum of the electrons is determined by

1009
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
observing the spins of the electrons. In the case of being in a
magnetic field, the spins can be randomly up and down. Based
on the principles of quantum mechanics, spins exist
simultaneously in both the up and down state until
measurement is made. It can only be observed that it is in a
certain rotational state when the measurement is made. The
state of the electron before the measurement takes place is
called the superposition state. The superposition state enables
parallel processing in quantum systems, fulfilling the principle
that quantum computers are superior to classical computers in
terms of speed, solving the difficulties experienced in
encrypting long messages in encryption algorithms in
classical computers.

Fig. 6. 3 node teleportation between Alice, Bob and


Charlie[14].

V. SUPERDENSE CODING
Superdense coding is another protocol using in quantum
communication. Difference from teleportation is that in this
communication protocol, known states are sent to the client
via the channel. In the process of transmitting information in
teleportation, 1 qubit is required for information, 2 classical
bits for verification. Contrary to teleportation, in superdense
coding, 2 classical bits are required for information, 1 qubit is
for verification. By using superdense coding protocol, the
possibility of obtaining messages by eavesdropping that
occurs in today's communication channels is eliminated[6],
[15].
Fig. 5. Spin orientations of an electron in a superposition
state[12].

B. Entanglement Principle in Quantum Communication


The situation where two or more similar particles are
simultaneously affected by each other and the communication
between them is not broken regardless of the distance is called
entanglement in quantum mechanics. Two similar particles
are in both 0 and 1 states until the measurement is made. If a
measurement is made in one, the other is also affected, and the
state of the first particle cannot be defined without knowing
the state of the second particle. By means of the entanglement
principle in quantum communication, high-speed information
transmission can be achieved. In large-scale quantum
networks, entanglement concerns of great importance.
IV. TELEPORTATION Fig. 7. Superdense coding scheme[14].
Teleportation is a protocol used in quantum information
According to fig. 7. Alice chooses 2-bit classical
communication.
information to send to Bob. It is also possible for this selected
Transmission of an unknown state to the client can be information to be one of the values 01,10,11. In this example,
accomplished using teleportation. There is no physical it is treated as 00. Before transmitting the information to Bob,
channel for information transfer by teleportation. The Alice applies one of the quantum gates to the bits where the
realization of the transfer is based on the principle of quantum information is contained to eliminate the danger of
entanglement. There are teleportation protocols that use eavesdropping by interfering with the communication
different forms of entanglement between server and client to channel. The structure of the superdense coding protocol is
transmit quantum states. These teleportation protocols differ shown in Table I.
according to the entanglement form being pure and
hybrid[13].
Teleportation is based on the method of transforming the
character of the state that is transmitted into information as
quantum states afterward, reconstructing it by making use of
this quantum state on the client side. There is no physical
teleportation of a particle to the other side.

1010
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
• Bob disentangles the X and Z components of the qubit
by applying CNOT and H to Alice’s qubit and
TABLE I. SUPERDENSE CODING PROTOCOL Charlie’s qubit.Then he measures each of Alice’s and
Message Applied Obtained Charlie’s qubits to obtain b1 and b2, respectively[16].
To Quantum State(√2)
Transmit Gate VII. CONCLUSION
00 I |00⟩+ |11⟩ The use of physical sockets for quantum computers is
10 X |01⟩+ |10⟩
realized with software technologies. In particular, the use of
01 Z |00⟩- |11⟩
11 ZX -|01⟩+
sockets for key exchange and data communication is one of
|11⟩ the most important components of communication. In addition
to the development of entanglement-based communication
Fig. 8. Applying Superdense coding protocol
protocols, the power of communication over sockets will
VI. APPLICATION increase and data transfer will reach enormous dimensions
with the use of quantum internet technologies. Expected to
develop communication channels with a much larger capacity
instead of communication channels such as FTP, HTTPS, and
SMTP used in classical computers. Socket software will also
take on the role of quantum key distribution where quantum
technologies are used in security. A system that will ensure
the security and accuracy of communication will also take
quantum communication technologies to the next level. It will
Fig. 9. Flow charting of socket communication application be possible to connect hundreds of control computers to a
single quantum computer at the same time and communicate.
Parallel data transmission, which is expected to eliminate the The realization of API technologies with quantum sockets in
problems in sending the data between the sender and the remote and local networks will increase the performance of
receiver with the increasing data quality and size, and that communication and remove bottlenecks in communication.
will be used in communication with the superposition [1] P. Parashar ve S. singh, “SOCKET PROGRAMMING”, 4, c. 3, Ağu.
principle, is shown in fig.8. 2017, [Çevrimiçi]. Erişim adresi:
https://www.academia.edu/35238963/SOCKET_PROGRAMMING
In the simulation application, data transmission simulation
[2] C. Elliott, “Building the quantum network”, Tem. 2022, [Çevrimiçi].
was carried out with superdense coding. The “Squanch” Erişim adresi: https://iopscience.iop.org/article/10.1088/1367-
application developed for this is simulated with superdense 2630/4/1/346/pdf
coding. The transfer of 1Mb file between 1.8 km with [3] J. H. Bejanin vd., “The Quantum Socket: Three-Dimensional Wiring
superdense encoding was carried out. Noise problem was not for Extensible Quantum Computing”, 2016, [Çevrimiçi]. Erişim adresi:
ignored during communication. https://arxiv.org/pdf/1606.00063.pdf
[4] T. Satoh ve R. V. Meter, “Quantum Sockets for the NISQ Era Quantum
Internet”, [Çevrimiçi]. Erişim adresi:
http://www.ngc.is.ritsumei.ac.jp/~ger/static/AQIS18/OnlineBooklet/1
58.pdf
[5] P. S. Lakshmi ve G. Murali, “Comparison of Classical and Quantum
Cryptography using QKD Simulator”, s.
https://www.researchgate.net/publication/359506774_Comparison_of
_Classical_and_Quantum_Cryptography_using_QKD_Simulator,
Mar. 2022.
[6] “IBM Socket Programming”. IBM, 2001. [Çevrimiçi]. Erişim adresi:
https://www.ibm.com/docs/en/ssw_ibm_i_71/rzab6/rzab6.pdf
[7] S. Sharma, “Introduction To Socket Programming In Java”. 19 Eylül
2019. [Çevrimiçi]. Erişim adresi: https://www.c-
sharpcorner.com/UploadFile/fd0172/introduction-to-socket-
programming-in-java/
Fig. 10. Flow chart of superdense coding[16].
[8] T. Gupta, “Socket Programming in Computer Network”. 19 Ağustos
2022. [Çevrimiçi]. Erişim adresi:
https://www.scaler.com/topics/computer-network/socket-
programming/
• Charlie generates EPR pairs in the state [9] A. Malik, “Quantum Computing opens new front in Cloud!” 26 Aralık
2017. [Çevrimiçi]. Erişim adresi:
https://netmanias.com/en/post/blog/12995/cloud-sdn-nfv/quantum-
|00⟩ |11⟩ (4) computing-opens-new-front-in-cloud

[10] J. Preskill, “Quantum Computing in the NISQ era and beyond”,
Quantum, c. 2, s. 79, Ağu. 2018, doi: 10.22331/q-2018-08-06-79.
He sends one particle to Alice and the other to Bob[16]. [11] Z. Vernon, “Scaling photonic quantum computers”, University of
Pavia colloquium, 29 Nisan 2021. [Çevrimiçi]. Erişim adresi:
• Alice encodes her two bits of classical inforation in the http://www-
relative sign and phase of her qubit by acting with the 2.unipv.it/dottorati/scienzeetecnologie/fisica/n/web_PhD/attachments/
Pauli-X and Z gates. Formally, if she has two section/19/Colloquium-Vernon-29-04-2021-slides.pdf
bits, b1 and b2, she applies X if 2 1 and then [12] H. Johnston, “Search for electron’s electric dipole moment narrows”.
14 Kasım 2013. [Çevrimiçi]. Erişim adresi:
applies Z if 1 1. She then sends the modified qubit https://physicsworld.com/a/search-for-electrons-electric-dipole-
to Bob[16]. moment-narrows/

1011
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
[13] M. He ve R. Malaney, “Teleportation of Hybrid Entangled States with Microelectronics - Proceedings, MIEL 2012, May. 2012, doi:
Continuous-Variable Entanglement”. arXiv, 2022. doi: 10.1109/MIEL.2012.6222789.
10.48550/ARXIV.2208.07495. [16] “Superdense Coding”. [Çevrimiçi]. Erişim adresi: https://att-
[14] R. Van Meter vd., “A Quantum Internet Architecture”. arXiv, 2021. innovate.github.io/squanch/demos/superdense-coding.html
doi: 10.48550/ARXIV.2112.07092.
[15] P. I. Hagouel ve I. Karafyllidis, “Quantum computers: Registers, gates
and algorithms”, 2012 28th International Conference on

1012
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.

You might also like