Mutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication

نویسندگان

  • Minyoung Bae
  • Hana Kang
  • Ju-Sung Kang
  • Yongjin Yeom
چکیده

It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that can solve the authentication problems of quantum cryptography using pre-shared key and quantum key distribution. The proposed mechanisms can be efficiently applied to current quantum cryptographic devices, and are more secure than the modern cryptographic authentication method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Communication Using Qubits

A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice’s qubit source is perfect in the sense that it does not ina...

متن کامل

Quantum Key Distribution via BB84 An Advanced Lab Experiment

Electronic communication has become one of the main pillars of modern society and their ongoing boom requires the development of new methods and techniques to secure data transmission. This has been the goal since the onset of cryptography in ancient times. Cryptography may be defined as the art of writing (encryption) and deciphering (decryption) messages in code in order to ensure their confi...

متن کامل

Defeating Man-in-the-Middle Attack in Quantum Key Distribution

Quantum cryptosystems use some properties of quantum mechanics to create secret shared cryptographic keys that remain secret even against an eavesdropper with an access to unlimited computational power. All quantum key distribution (QKD) protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from ...

متن کامل

Secured Communication Protocol via Encrypted Key Ensuring Message Integrity

The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...

متن کامل

6.453 Quantum Optical Communication Reading 16

In this lecture we will examine the first commercial application of quantum optical communication: quantum cryptography. We’ll start with a purely classical case, and show that a one-time pad provides totally secure digital communication. The difficulty of creating a shared one-time pad between remote sites will then lead us into quantum cryptography, or, more properly, quantum key distribution...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017