Title :
A secure protocol using 6DP for quantum authentication and hash functions for key distribution (KDP-6DP)
Author :
Al-Khateeb, Khalid A S ; Saeb, Magdy M. ; Majeed, Mohammed Munther A ; Wahiddin, Mohamed R.
Author_Institution :
Electr. & Comput. Eng. Dept., Int. Islamic Univ. Malaysia (IIUM), Kuala Lumpur, Malaysia
Abstract :
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP.
Keywords :
cryptographic protocols; message authentication; quantum cryptography; deterministic six-state quantum protocol; hash function; key distribution protocol; out-of-band authentication methodology; protocol security; quantum authentication; quantum security; Authentication; Computers; Protocols; Receivers; Servers; Virtual private networks; Deterministic Six-State Quantum Protocol (6DP); Hash Functions; Key Distribution Protocol (KDP); Quantum Authentication Process (QAP;
Conference_Titel :
Computer and Communication Engineering (ICCCE), 2010 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4244-6233-9
DOI :
10.1109/ICCCE.2010.5556781