A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from send...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/1/A_Secure_Protocol_Using_6DP_for_Quantum_Authentication_and_Hash_Functions_for_Key__Distribution_%28KDP-6DP%29.pdf |
id |
iium-5426 |
---|---|
recordtype |
eprints |
spelling |
iium-54262015-10-16T08:23:10Z http://irep.iium.edu.my/5426/ A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) Al-Khateeb, Khalid A. Saeed A. Majeed, Mohammed Munther M. Saeb, Magdy Wahiddin, Mohamed Ridza TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP. 2010-08-23 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/5426/1/A_Secure_Protocol_Using_6DP_for_Quantum_Authentication_and_Hash_Functions_for_Key__Distribution_%28KDP-6DP%29.pdf Al-Khateeb, Khalid A. Saeed and A. Majeed, Mohammed Munther and M. Saeb, Magdy and Wahiddin, Mohamed Ridza (2010) A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP). In: International Conference on Computer and Communication Engineering, ICCCE 2010, 11-13 May 2010, Kuala Lumpur, Malaysia. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5556781 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering Al-Khateeb, Khalid A. Saeed A. Majeed, Mohammed Munther M. Saeb, Magdy Wahiddin, Mohamed Ridza A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) |
description |
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP. |
format |
Conference or Workshop Item |
author |
Al-Khateeb, Khalid A. Saeed A. Majeed, Mohammed Munther M. Saeb, Magdy Wahiddin, Mohamed Ridza |
author_facet |
Al-Khateeb, Khalid A. Saeed A. Majeed, Mohammed Munther M. Saeb, Magdy Wahiddin, Mohamed Ridza |
author_sort |
Al-Khateeb, Khalid A. Saeed |
title |
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) |
title_short |
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) |
title_full |
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) |
title_fullStr |
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) |
title_full_unstemmed |
A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP) |
title_sort |
secure protocol using 6dp for quantum authentication and hash functions for key distribution (kdp-6dp) |
publishDate |
2010 |
url |
http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/1/A_Secure_Protocol_Using_6DP_for_Quantum_Authentication_and_Hash_Functions_for_Key__Distribution_%28KDP-6DP%29.pdf |
first_indexed |
2023-09-18T20:14:01Z |
last_indexed |
2023-09-18T20:14:01Z |
_version_ |
1777407667099140096 |