Implementation of Socket Programming Simulation Using Quantum Communication Technologies
Implementation of Socket Programming Simulation Using Quantum Communication Technologies
Abstract— Using socket programming, which plays a major As in all kinds of communication, one of the most
role in the communication between devices and people, data is important elements in communication using socket
transmitted instantly over predetermined ports. By the programming is the security of communication. Today,
evolution of technology, the size of the data is increasing due to classical security protocols and encryption algorithms, which
the increase in the quality of the data. As a result, there are allow us to provide confidentiality and security during
losses and delays in data transfers. According to the research, it communication, give great deficits against the principle of
is assumed that applications and systems to be developed using confidentiality at the point where technology has come. The
quantum technologies will be useful in solving these problems. vulnerability is much higher in methods that use wireless
In this study, firstly information was given about the mechanism
networks such as socket programming. The reason for this is
in classical socket programming and the problems encountered
in this mechanism. Then, by giving information about quantum
that security measures exist within the hardware infrastructure
communication and the methods used in this communication, in wired networks, and limited hardware resources and power
the quantum solutions to these problems were examined, the units are available in wireless networks. These reasons make
application was coded in the quantum programming language systems using the wireless network highly vulnerable to DOS
and the communication between two ports with quantum socket and many attacks.
programming was simulated. The results obtained from this The security key sizes provided by the symmetric and
simulation was compared with the classically obtained results. asymmetric encryption algorithms need to constantly increase
Communication simulation between sockets was performed
to increase security against attacks that develop by
using teleportation and super-dense coding in quantum
computers.
themselves.
In classical algorithms, keys encrypt the message and send
Keywords— Quantum Communication, Quantum Computers, it to the client via the channel. The keys used for security in
Quantum Socket Programming, Instant Data Transmission, Port quantum encryption algorithms are randomly generated and
component instead of encrypting and sending the message, it uses the key
I. INTRODUCTION to generate the message on the client side without transmitting
it through the channel. The information sent to the client is the
Socket Programming refers to the technique of performing key information, not the message itself[5].
instant communication between two systems, the client and
the server, over the TCP/IP protocol, and allows a single II. SOCKET PROGRAMMING
computer to serve many different clients at once[1]. Socket Socket programming is a programming technique used to
programming plays a major role in areas such as drone manage communication between client and server. It
communication, inter-device communication, and the internet communicates using TCP/IP or UDP protocol. The socket
of things. In these areas, it is very important that the data goes structure in socket programming consists of an IP address and
from the server to the client without delay and safely. Owing port. These two elements come together to form a socket end,
to the increasing complexity of the systems used, the increase then communicate with other socket ends. The basis of the
in data sizes, the decrease in the sending speed, and the socket programming concept is the Socket API determined by
increase in system attacks, it is of great importance to offer Berkeley Sockets. To establish communication between the
innovative approaches to situations where the currently used server and client computers, both computers must open the
socket programming is missing or insufficient[2]. Recent socket paths with the socket function[3], [6].
research and studies by companies working in the academic
and quantum fields have shown that quantum technologies
will provide acceleration and security increase over classical
methods[3], [4].
Contrary to classical computers, quantum computers can
handle multiple states simultaneously. States 0 and 1 in
classical computers can be processed in parallel, including all
possibilities between states 0 and 1 simultaneously in quantum
computers. In this way, quantum computers can perform
multiple operations simultaneously. As a result, a much higher
communication and processing speed is achieved compared to
classical computers.
1008
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
In smart city applications, data comes from mobile
devices, cameras in the city, or sensors on objects.
Management of each port of this can be done by quantum
socket programming.
Socket programming is also an important requirement for
cloud computing. Multi-cloud technologies using in today,
depending on the development of quantum technologies. Any
transaction made in the Amazon cloud would also occur in the
Microsoft cloud at the same time, the studies on this subject
will be done with quantum socket programming.
Today, the transmission of e-mails is provided with socket
programming. In classical computers, this process is realized
with access ports such as 110, 465, 993. In quantum socket
programming, this transmission would be made with ports that
are more secure and have no limitations.
In the structure of Superconductor computers, sensor
technologies are used to access the output. Programming of
sensors can be done with socket programming techniques in
quantum computers as well as in classical computers.
III. QUANTUM COMPUTERS
Quantum computers make calculations and other
operations based on quantum physics and mechanics, and use
small units of matter to manipulate information. (Atomic and
subatomic particles, photons, etc.). The smallest and most
basic unit of quantum computers is the qubit(Qbit). Qubit is a
quantum system consisting of a binary system, symbolized by Fig. 3. Representation of classical and quantum bits on
coordinate system[9].
two states as |0⟩ and |1⟩. These two cases are represented by
the bracket notation Dirac defined, and each corresponds to a
Quantum computers are separated into universal and non-
column vector. States in (1) represent the polarization state of
universal.
atoms and subatomic particles or photons. The equational
expression of a qubit is shown in (2). Universal quantum computers are a type of quantum
computer that will emerge, in theory, by combining the power
1 0
|0⟩ = 0
ve |1⟩ = 1
(1) of classical computers and quantum computers. There is no
universal quantum computer currently in use.
| ⟩ | ⟩ | ⟩ (2) Non-universal quantum computers are a type of quantum
computer developed to solve a specific problem. It performs
According to quantum mechanics, the position and their operations by using different systems (photonic, ion,
momentum information of a particle cannot be accessed at the spin, superconductor, etc.). Today, quantum computers used
same time. The function must consist of complex numbers so in applications such as high computation and simulations
that one value cannot be known while the other is known. developed by giant technology companies (IBM, Xanadu,
Therefore, α and β values consist of complex numbers. The Google, etc.) are known as non-universal quantum
value α2 indicates the probability that |µ> is found based on computers[10]. Following the searches, the number of qubits
|0>; the value of β2 shows the probability of finding |µ> on the used in computers is increasing day by day, and the processing
basis of |1>. According to the laws of physics, the sum of two capacity of quantum computers increase.
values is always equal to the real number 1 as shown in (3).
1 (3)
1009
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
observing the spins of the electrons. In the case of being in a
magnetic field, the spins can be randomly up and down. Based
on the principles of quantum mechanics, spins exist
simultaneously in both the up and down state until
measurement is made. It can only be observed that it is in a
certain rotational state when the measurement is made. The
state of the electron before the measurement takes place is
called the superposition state. The superposition state enables
parallel processing in quantum systems, fulfilling the principle
that quantum computers are superior to classical computers in
terms of speed, solving the difficulties experienced in
encrypting long messages in encryption algorithms in
classical computers.
V. SUPERDENSE CODING
Superdense coding is another protocol using in quantum
communication. Difference from teleportation is that in this
communication protocol, known states are sent to the client
via the channel. In the process of transmitting information in
teleportation, 1 qubit is required for information, 2 classical
bits for verification. Contrary to teleportation, in superdense
coding, 2 classical bits are required for information, 1 qubit is
for verification. By using superdense coding protocol, the
possibility of obtaining messages by eavesdropping that
occurs in today's communication channels is eliminated[6],
[15].
Fig. 5. Spin orientations of an electron in a superposition
state[12].
1010
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
• Bob disentangles the X and Z components of the qubit
by applying CNOT and H to Alice’s qubit and
TABLE I. SUPERDENSE CODING PROTOCOL Charlie’s qubit.Then he measures each of Alice’s and
Message Applied Obtained Charlie’s qubits to obtain b1 and b2, respectively[16].
To Quantum State(√2)
Transmit Gate VII. CONCLUSION
00 I |00⟩+ |11⟩ The use of physical sockets for quantum computers is
10 X |01⟩+ |10⟩
realized with software technologies. In particular, the use of
01 Z |00⟩- |11⟩
11 ZX -|01⟩+
sockets for key exchange and data communication is one of
|11⟩ the most important components of communication. In addition
to the development of entanglement-based communication
Fig. 8. Applying Superdense coding protocol
protocols, the power of communication over sockets will
VI. APPLICATION increase and data transfer will reach enormous dimensions
with the use of quantum internet technologies. Expected to
develop communication channels with a much larger capacity
instead of communication channels such as FTP, HTTPS, and
SMTP used in classical computers. Socket software will also
take on the role of quantum key distribution where quantum
technologies are used in security. A system that will ensure
the security and accuracy of communication will also take
quantum communication technologies to the next level. It will
Fig. 9. Flow charting of socket communication application be possible to connect hundreds of control computers to a
single quantum computer at the same time and communicate.
Parallel data transmission, which is expected to eliminate the The realization of API technologies with quantum sockets in
problems in sending the data between the sender and the remote and local networks will increase the performance of
receiver with the increasing data quality and size, and that communication and remove bottlenecks in communication.
will be used in communication with the superposition [1] P. Parashar ve S. singh, “SOCKET PROGRAMMING”, 4, c. 3, Ağu.
principle, is shown in fig.8. 2017, [Çevrimiçi]. Erişim adresi:
https://www.academia.edu/35238963/SOCKET_PROGRAMMING
In the simulation application, data transmission simulation
[2] C. Elliott, “Building the quantum network”, Tem. 2022, [Çevrimiçi].
was carried out with superdense coding. The “Squanch” Erişim adresi: https://iopscience.iop.org/article/10.1088/1367-
application developed for this is simulated with superdense 2630/4/1/346/pdf
coding. The transfer of 1Mb file between 1.8 km with [3] J. H. Bejanin vd., “The Quantum Socket: Three-Dimensional Wiring
superdense encoding was carried out. Noise problem was not for Extensible Quantum Computing”, 2016, [Çevrimiçi]. Erişim adresi:
ignored during communication. https://arxiv.org/pdf/1606.00063.pdf
[4] T. Satoh ve R. V. Meter, “Quantum Sockets for the NISQ Era Quantum
Internet”, [Çevrimiçi]. Erişim adresi:
http://www.ngc.is.ritsumei.ac.jp/~ger/static/AQIS18/OnlineBooklet/1
58.pdf
[5] P. S. Lakshmi ve G. Murali, “Comparison of Classical and Quantum
Cryptography using QKD Simulator”, s.
https://www.researchgate.net/publication/359506774_Comparison_of
_Classical_and_Quantum_Cryptography_using_QKD_Simulator,
Mar. 2022.
[6] “IBM Socket Programming”. IBM, 2001. [Çevrimiçi]. Erişim adresi:
https://www.ibm.com/docs/en/ssw_ibm_i_71/rzab6/rzab6.pdf
[7] S. Sharma, “Introduction To Socket Programming In Java”. 19 Eylül
2019. [Çevrimiçi]. Erişim adresi: https://www.c-
sharpcorner.com/UploadFile/fd0172/introduction-to-socket-
programming-in-java/
Fig. 10. Flow chart of superdense coding[16].
[8] T. Gupta, “Socket Programming in Computer Network”. 19 Ağustos
2022. [Çevrimiçi]. Erişim adresi:
https://www.scaler.com/topics/computer-network/socket-
programming/
• Charlie generates EPR pairs in the state [9] A. Malik, “Quantum Computing opens new front in Cloud!” 26 Aralık
2017. [Çevrimiçi]. Erişim adresi:
https://netmanias.com/en/post/blog/12995/cloud-sdn-nfv/quantum-
|00⟩ |11⟩ (4) computing-opens-new-front-in-cloud
√
[10] J. Preskill, “Quantum Computing in the NISQ era and beyond”,
Quantum, c. 2, s. 79, Ağu. 2018, doi: 10.22331/q-2018-08-06-79.
He sends one particle to Alice and the other to Bob[16]. [11] Z. Vernon, “Scaling photonic quantum computers”, University of
Pavia colloquium, 29 Nisan 2021. [Çevrimiçi]. Erişim adresi:
• Alice encodes her two bits of classical inforation in the http://www-
relative sign and phase of her qubit by acting with the 2.unipv.it/dottorati/scienzeetecnologie/fisica/n/web_PhD/attachments/
Pauli-X and Z gates. Formally, if she has two section/19/Colloquium-Vernon-29-04-2021-slides.pdf
bits, b1 and b2, she applies X if 2 1 and then [12] H. Johnston, “Search for electron’s electric dipole moment narrows”.
14 Kasım 2013. [Çevrimiçi]. Erişim adresi:
applies Z if 1 1. She then sends the modified qubit https://physicsworld.com/a/search-for-electrons-electric-dipole-
to Bob[16]. moment-narrows/
1011
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.
[13] M. He ve R. Malaney, “Teleportation of Hybrid Entangled States with Microelectronics - Proceedings, MIEL 2012, May. 2012, doi:
Continuous-Variable Entanglement”. arXiv, 2022. doi: 10.1109/MIEL.2012.6222789.
10.48550/ARXIV.2208.07495. [16] “Superdense Coding”. [Çevrimiçi]. Erişim adresi: https://att-
[14] R. Van Meter vd., “A Quantum Internet Architecture”. arXiv, 2021. innovate.github.io/squanch/demos/superdense-coding.html
doi: 10.48550/ARXIV.2112.07092.
[15] P. I. Hagouel ve I. Karafyllidis, “Quantum computers: Registers, gates
and algorithms”, 2012 28th International Conference on
1012
Authorized licensed use limited to: Zhejiang University. Downloaded on December 13,2023 at 16:56:56 UTC from IEEE Xplore. Restrictions apply.