A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from se...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/22653/ http://irep.iium.edu.my/22653/ http://irep.iium.edu.my/22653/1/p341.pdf |
id |
iium-22653 |
---|---|
recordtype |
eprints |
spelling |
iium-226532012-04-10T00:01:07Z http://irep.iium.edu.my/22653/ A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) Al-Khateeb, Khalid A. Saeed Abdul Majeed, Mohammed Munther Ridza, Mohamed Saeb, Magdy M. TK Electrical engineering. Electronics Nuclear engineering Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. This protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum authentication protocol that is referred to as 6DP. 2010 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/22653/1/p341.pdf Al-Khateeb, Khalid A. Saeed and Abdul Majeed, Mohammed Munther and Ridza, Mohamed and Saeb, Magdy M. (2010) A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP). In: IIUM Research, Innovation & Invention Exhibition (IRIIE 2010), 26 - 27 January 2010, Kuala Lumpur. http://www.iium.edu.my/irie/10/sub10/author/list_p.php |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering. Electronics Nuclear engineering Al-Khateeb, Khalid A. Saeed Abdul Majeed, Mohammed Munther Ridza, Mohamed Saeb, Magdy M. A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) |
description |
Security is the most tedious problem in highly sensitive communications. Quantum security is the key
issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed.
The essential part of the protocol depends on sending a string of random characters from sender to
receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used
to construct the key. Consequently, the session key is generated on-site by independently applying a hash
function on the random string at the sender and receiver sides. This protocol requires a reliable method of
authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based
on the deterministic six-state quantum authentication protocol that is referred to as 6DP. |
format |
Conference or Workshop Item |
author |
Al-Khateeb, Khalid A. Saeed Abdul Majeed, Mohammed Munther Ridza, Mohamed Saeb, Magdy M. |
author_facet |
Al-Khateeb, Khalid A. Saeed Abdul Majeed, Mohammed Munther Ridza, Mohamed Saeb, Magdy M. |
author_sort |
Al-Khateeb, Khalid A. Saeed |
title |
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) |
title_short |
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) |
title_full |
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) |
title_fullStr |
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) |
title_full_unstemmed |
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP) |
title_sort |
secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6dp (kdp-6dp) |
publishDate |
2010 |
url |
http://irep.iium.edu.my/22653/ http://irep.iium.edu.my/22653/ http://irep.iium.edu.my/22653/1/p341.pdf |
first_indexed |
2023-09-18T20:34:28Z |
last_indexed |
2023-09-18T20:34:28Z |
_version_ |
1777408953412485120 |