A Quantum Cryptographic Protocal with Detection of Compromised Server
نویسندگان
چکیده
This paper presents a server-based hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. A novel feature of the protocol is that it can detect a compromised server. Additional advantages are that it avoids the requirement for timestamps used in classical protocols, guarantees that the trusted server cannot know the authentication key, can provide resistance to multiple photon attacks, and can be used with BB84 or other quantum key distribution protocols. Each resource shares a previously distributed secret key with the trusted server, and resources can communicate with the server using both classical and quantum channels. Resources do not share secret keys with each other, so that the key distribution problem for the network is
منابع مشابه
A quantum cryptographic protocol with detection of compromised server
This paper presents a server-based hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. A novel feature of the protocol is that it can detect a compromised server. Additional advantages are that it avoids the requirement for timestamps used in classical protocols, guarantees that the trusted server...
متن کاملDifferential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملPassword - Only Authenticated Key Exchange Using Distributed Server
Authentication using Passwordauthenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key exchange of messages. Database of all passwords to authenticate clients are stored in a distributed server. If the server is compromised, the attacker cannot act like a client with the information from the compromised server. Solution produced for distributed-server PAKE ...
متن کاملTowards a Mechanization of Cryptographic Protocal Verification
We revisit the approach deened in 2] for the formal veriication of cryptographic protocols so as to allow for some mechanization in the veriication process. In the original approach veriication uses theorem proving. Here we show that for a wide range of practical situations and properties it is possible to perform the veriication on a nite and safe abstract model.
متن کاملSecret Key Generation and Eavesdropping detection using Quantum Cryptography
Quantum Cryptography is based upon the use of quantum effects and extends those effects for conventional cryptographic methods. The two major advantages of quantum cryptography over conventional cryptography are true random secret key generation and eavesdropping detection. Quantum cryptography has been developed which promises more secure communication than any existing technique and cannot be...
متن کامل