DocumentCode :
2893127
Title :
Secure and efficient key management technique in quantum cryptography network
Author :
Pattaranantakul, Montida ; Janthong, Aroon ; Sanguannam, Kittichai ; Sangwongngam, Paramin ; Sripimanwat, Keattisak
Author_Institution :
Opt. & Quantum Commun. Lab., Nat. Electron. & Comput. Technol. Center, Pathumthani, Thailand
fYear :
2012
fDate :
4-6 July 2012
Firstpage :
280
Lastpage :
285
Abstract :
In conventional security mechanism, security services based on symmetric key cryptography assume keys to be distributed prior to secure communications. The core function of exchanging and sharing a secret key between two endpoints are the secure key management methodology which is one of the most critical elements need to be more concerned when integrating cryptographic functions into the system. In case the key management mechanisms is weak can lead to the vulnerability holes or a potentially fatal outsider attacks as the harmful effects to the system. Since, there is still no standardized architecture or protocol that can provide cross application symmetric key management services. Therefore, this paper approaches a secure key management model and its custom protocols to build Thailand quantum trusted network with offers simultaneous quantum key distribution to multiple user overtime. Consequently, the proposed technique has also overcome the limitation of quantum point-to-point key sharing. Based on the discussion of key management security requirement, deal with generic key management concepts and designing the new custom protocols to close the possibility loopholes, to offers reliability and convenience of use, as well as to introduce a secure and efficient key management technique for quantum cryptography network in Thailand where any communication services can take place.
Keywords :
protocols; quantum cryptography; telecommunication security; Thailand quantum trusted network; communication services; cryptographic functions; custom protocols; efficient key management technique; harmful effects; multiple user overtime; potentially fatal outsider attacks; protocol; quantum cryptography network; quantum key distribution; secure communications; secure key management methodology; secure key management technique; security mechanism; security services; symmetric key cryptography; Encryption; Peer to peer computing; Protocols; Servers; Virtual private networks; Custom protocols; Key Management; Quantum Keys;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous and Future Networks (ICUFN), 2012 Fourth International Conference on
Conference_Location :
Phuket
ISSN :
2165-8528
Print_ISBN :
978-1-4673-1377-3
Electronic_ISBN :
2165-8528
Type :
conf
DOI :
10.1109/ICUFN.2012.6261711
Filename :
6261711
Link To Document :
بازگشت