<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="static/style.xsl"?><OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd"><responseDate>2026-04-17T21:24:24Z</responseDate><request verb="GetRecord" identifier="oai:www.recercat.cat:2117/423350" metadataPrefix="marc">https://recercat.cat/oai/request</request><GetRecord><record><header><identifier>oai:recercat.cat:2117/423350</identifier><datestamp>2025-07-23T01:55:08Z</datestamp><setSpec>com_2072_1033</setSpec><setSpec>col_2072_452951</setSpec></header><metadata><record xmlns="http://www.loc.gov/MARC21/slim" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:doc="http://www.lyncode.com/xoai" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
   <leader>00925njm 22002777a 4500</leader>
   <datafield ind2=" " ind1=" " tag="042">
      <subfield code="a">dc</subfield>
   </datafield>
   <datafield ind2=" " ind1=" " tag="720">
      <subfield code="a">Andrade, Sebastian</subfield>
      <subfield code="e">author</subfield>
   </datafield>
   <datafield ind2=" " ind1=" " tag="260">
      <subfield code="c">2024-07-11</subfield>
   </datafield>
   <datafield ind2=" " ind1=" " tag="520">
      <subfield code="a">Quantum Key Distribution (QKD) represents a groundbreaking advancement in the field of cryptography, leveraging the principles of quantum mechanics to establish secure communication channels. Unlike classical cryptographic methods, QKD promises theoretically unbreakable security by ensuring that any attempt at eavesdropping can be detected. This thesis explores the practical implementation, challenges, and comparative security of various QKD scenarios within modern network infrastructures. We specifically analyze the security implications of integrating QKD with Software-Defined Networking (SDN) and compare it against Quantum Random Number Generators (QRNG), Post-Quantum Cryptography (PQC), and Physical Unclonable Functions under different conditions, with the aim of providing a comprehensive evaluation of the strengths and vulnerabilities of each approach, guiding future developments in secure communication systems. After the analysis performed in this Master Thesis, we can safely conclude that the Quantum Key Distribution scenario is the ideal use case, having the highest overall security score. Meanwhile, the scenarios of QRNG and PQC are the closest to the ideal security when compared to QKD. Finally, while the PUF scenario has the lowest overall security score, it still presents better authentication features that can prove beneficial if combined with other scenarios.</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Cryptography</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Computer security</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Quantum computing</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Quantum Key Distribution</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Quantum Random Number Generators</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Post-Quantum Cryptography</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Physical Unclonable Functions</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Criptografia</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Seguretat informàtica</subfield>
   </datafield>
   <datafield tag="653" ind2=" " ind1=" ">
      <subfield code="a">Computació quàntica</subfield>
   </datafield>
   <datafield ind2="0" ind1="0" tag="245">
      <subfield code="a">Increasing Security by using quantum keys and physical unclonable functions</subfield>
   </datafield>
</record></metadata></record></GetRecord></OAI-PMH>