Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing ke...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/5622/ http://irep.iium.edu.my/5622/ http://irep.iium.edu.my/5622/1/Protocol_of_Secure_Key_Distribution_Using_Hash_Functions_and_Quantum.pdf |
id |
iium-5622 |
---|---|
recordtype |
eprints |
spelling |
iium-56222011-11-23T08:44:46Z http://irep.iium.edu.my/5622/ Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol Majeed, Mohammed Munther A. Al-Khateeb, Khalid A. Saeed Wahiddin, Mohamed Ridza Saeb, Magdy M. TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing key according to previous points. Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. The concepts presented by this protocol represent a valid approach to the communication security problem. Science Publications 2010 Article PeerReviewed application/pdf en http://irep.iium.edu.my/5622/1/Protocol_of_Secure_Key_Distribution_Using_Hash_Functions_and_Quantum.pdf Majeed, Mohammed Munther A. and Al-Khateeb, Khalid A. Saeed and Wahiddin, Mohamed Ridza and Saeb, Magdy M. (2010) Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol. Journal of Computer Science, 6 (10). pp. 1094-1100. ISSN 1549-3636 http://thescipub.com/issue-jcs/6/10 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering |
spellingShingle |
TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering Majeed, Mohammed Munther A. Al-Khateeb, Khalid A. Saeed Wahiddin, Mohamed Ridza Saeb, Magdy M. Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
description |
Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing key according to previous points.
Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons.
Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. The concepts presented by this protocol represent a valid approach to the communication security problem. |
format |
Article |
author |
Majeed, Mohammed Munther A. Al-Khateeb, Khalid A. Saeed Wahiddin, Mohamed Ridza Saeb, Magdy M. |
author_facet |
Majeed, Mohammed Munther A. Al-Khateeb, Khalid A. Saeed Wahiddin, Mohamed Ridza Saeb, Magdy M. |
author_sort |
Majeed, Mohammed Munther A. |
title |
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
title_short |
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
title_full |
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
title_fullStr |
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
title_full_unstemmed |
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
title_sort |
protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol |
publisher |
Science Publications |
publishDate |
2010 |
url |
http://irep.iium.edu.my/5622/ http://irep.iium.edu.my/5622/ http://irep.iium.edu.my/5622/1/Protocol_of_Secure_Key_Distribution_Using_Hash_Functions_and_Quantum.pdf |
first_indexed |
2023-09-18T20:14:19Z |
last_indexed |
2023-09-18T20:14:19Z |
_version_ |
1777407685171347456 |