Skip to main content

2019 | OriginalPaper | Buchkapitel

12. An Ultra-Secure Router-to-Router Key Exchange System

verfasst von : Pramode K. Verma, Mayssaa El Rifai, Kam Wai Clifford Chan

Erschienen in: Multi-photon Quantum Secure Communication

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter presents an ultra-secure router-to-router key exchange system. The key exchange process can be initiated by either router at will and can be carried out as often as required. The cryptographic strength of the proposed protocols lies in the use of multi-stage transmission where the number of variables exceeds the number of stages by one, ensuring that the number of possible measurements is one less that the number of variables. The proposed system carries out all processing in electronics and is not vulnerable to the man in the middle attack. The treatment presented in this chapter is based on the authors’ work in [1, 2].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp. 1803–1807: IEEE. El Rifai, M., & Verma, P. K. (2013). An algorithmic approach to securing the three-stage quantum cryptography protocol. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (TrustCom), pp. 1803–1807: IEEE.
2.
Zurück zum Zitat Parmar, N. J., & Verma, P. K. (2017). A comparative evaluation of algorithms in the implementation of an ultra-secure router-to-router key exchange system. In Security and communication networks (vol. 2017, Article ID 1467614, 7 pages). https://doi.org/10.1155/2017/1467614. Parmar, N. J., & Verma, P. K. (2017). A comparative evaluation of algorithms in the implementation of an ultra-secure router-to-router key exchange system. In Security and communication networks (vol. 2017, Article ID 1467614, 7 pages). https://​doi.​org/​10.​1155/​2017/​1467614.
3.
Zurück zum Zitat Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: Principles and practice. London: Pearson. Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: Principles and practice. London: Pearson.
4.
Zurück zum Zitat Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560, 7–11. Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560, 7–11.
5.
Zurück zum Zitat Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92(5), 057901. Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92(5), 057901.
6.
Zurück zum Zitat Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121. Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68(21), 3121.
7.
Zurück zum Zitat Mandal, S., et al. (2012). Implementation of secure quantum protocol using multiple photons for communication. arXiv preprint. arXiv:1208.6198. Mandal, S., et al. (2012). Implementation of secure quantum protocol using multiple photons for communication. arXiv preprint. arXiv:​1208.​6198.
8.
Zurück zum Zitat Zhao, Z., Yang, T., Chen, Y.-A., Zhang, A.-N., & Pan, J.-W. (2003). Experimental realization of entanglement concentration and a quantum repeater. Physical Review Letters, 90(20), 207901. Zhao, Z., Yang, T., Chen, Y.-A., Zhang, A.-N., & Pan, J.-W. (2003). Experimental realization of entanglement concentration and a quantum repeater. Physical Review Letters, 90(20), 207901.
9.
Zurück zum Zitat Menn, J. (2012, 2 Feb). Key internet operator VeriSign hit by hackers. Reuters. Menn, J. (2012, 2 Feb). Key internet operator VeriSign hit by hackers. Reuters.
10.
Zurück zum Zitat Ore, O. (2017). Invitation to number theory. American Math Soc. Ore, O. (2017). Invitation to number theory. American Math Soc.
11.
Zurück zum Zitat Rosen, K. H. (1993). Elementary number theory and its applications. Addison-Wesley. Rosen, K. H. (1993). Elementary number theory and its applications. Addison-Wesley.
12.
Zurück zum Zitat Frisch, M., & Simmons, G. J. (1992). Public-key cryptography: State of the art and future directions: EISS workshop, Oberwolfach, Germany, 3–6 July 1991. Springer. Frisch, M., & Simmons, G. J. (1992). Public-key cryptography: State of the art and future directions: EISS workshop, Oberwolfach, Germany, 3–6 July 1991. Springer.
13.
Zurück zum Zitat Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
14.
Zurück zum Zitat Diffie, W., & Hellman, M. E. (1977). Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer, 10(6), 74–84. Diffie, W., & Hellman, M. E. (1977). Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer, 10(6), 74–84.
15.
Zurück zum Zitat Merkle, R. C., & Charles, R. (1979). Secrecy, authentication, and public key systems. Merkle, R. C., & Charles, R. (1979). Secrecy, authentication, and public key systems.
16.
Zurück zum Zitat Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993–999. Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993–999.
17.
Zurück zum Zitat Kak, S. (2006). A three-stage quantum cryptography protocol. Foundations of Physics Letters, 19(3), 293–296. Kak, S. (2006). A three-stage quantum cryptography protocol. Foundations of Physics Letters, 19(3), 293–296.
18.
Zurück zum Zitat Chen, Y., Kak, S., Verma, P. K., Macdonald, G., El Rifai, M., & Punekar, N. (2013). Multi-photon tolerant secure quantum communication—From theory to practice. In 2013 IEEE international conference on communications (ICC), pp. 2111–2116: IEEE. Chen, Y., Kak, S., Verma, P. K., Macdonald, G., El Rifai, M., & Punekar, N. (2013). Multi-photon tolerant secure quantum communication—From theory to practice. In 2013 IEEE international conference on communications (ICC), pp. 2111–2116: IEEE.
19.
Zurück zum Zitat Darunkar, B., & Verma, P. K. (2014). The braided single-stage protocol for quantum secure communication. In Quantum information and computation XII (vol. 9123, p. 912308). International Society for Optics and Photonics. Darunkar, B., & Verma, P. K. (2014). The braided single-stage protocol for quantum secure communication. In Quantum information and computation XII (vol. 9123, p. 912308). International Society for Optics and Photonics.
20.
Zurück zum Zitat Coppersmith, D. (1993). Modifications to the number field sieve. Journal of Cryptology, 6(3), 169–180. Coppersmith, D. (1993). Modifications to the number field sieve. Journal of Cryptology, 6(3), 169–180.
21.
Zurück zum Zitat Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303–332. Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303–332.
22.
Zurück zum Zitat Bos, J., Kaihara, M., Kleinjung, T., Lenstra, A. K., & Montgomery, P. L. (2009). On the security of 1024-bit RSA and 160-bit elliptic curve cryptography. Bos, J., Kaihara, M., Kleinjung, T., Lenstra, A. K., & Montgomery, P. L. (2009). On the security of 1024-bit RSA and 160-bit elliptic curve cryptography.
Metadaten
Titel
An Ultra-Secure Router-to-Router Key Exchange System
verfasst von
Pramode K. Verma
Mayssaa El Rifai
Kam Wai Clifford Chan
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8618-2_12

Neuer Inhalt