Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication
نویسندگان
چکیده
It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that can solve the authentication problems of quantum cryptography using pre-shared key and quantum key distribution. The proposed mechanisms can be efficiently applied to current quantum cryptographic devices, and are more secure than the modern cryptographic authentication method.
منابع مشابه
Secure Communication Using Qubits
A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice’s qubit source is perfect in the sense that it does not ina...
متن کاملQuantum Key Distribution via BB84 An Advanced Lab Experiment
Electronic communication has become one of the main pillars of modern society and their ongoing boom requires the development of new methods and techniques to secure data transmission. This has been the goal since the onset of cryptography in ancient times. Cryptography may be defined as the art of writing (encryption) and deciphering (decryption) messages in code in order to ensure their confi...
متن کاملDefeating Man-in-the-Middle Attack in Quantum Key Distribution
Quantum cryptosystems use some properties of quantum mechanics to create secret shared cryptographic keys that remain secret even against an eavesdropper with an access to unlimited computational power. All quantum key distribution (QKD) protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from ...
متن کاملSecured Communication Protocol via Encrypted Key Ensuring Message Integrity
The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...
متن کامل6.453 Quantum Optical Communication Reading 16
In this lecture we will examine the first commercial application of quantum optical communication: quantum cryptography. We’ll start with a purely classical case, and show that a one-time pad provides totally secure digital communication. The difficulty of creating a shared one-time pad between remote sites will then lead us into quantum cryptography, or, more properly, quantum key distribution...
متن کامل