A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP)
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from send...
Main Authors: | Al-Khateeb, Khalid A. Saeed, A. Majeed, Mohammed Munther, M. Saeb, Magdy, Wahiddin, Mohamed Ridza |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/ http://irep.iium.edu.my/5426/1/A_Secure_Protocol_Using_6DP_for_Quantum_Authentication_and_Hash_Functions_for_Key__Distribution_%28KDP-6DP%29.pdf |
Similar Items
-
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
by: Majeed, Mohammed Munther A, et al.
Published: (2010) -
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010) -
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010) -
Quantum states for 6DP quantum key distribution protocol
by: Abdul Khir , Mohd Fared, et al.
Published: (2013) -
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)