Skip to main content
Erschienen in: Quantum Information Processing 12/2015

01.12.2015

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

verfasst von: R. Lalu Naik, P. Chenna Reddy

Erschienen in: Quantum Information Processing | Ausgabe 12/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Key distribution protocols with time stamps stop replays of compromised keys. The time stamps have the further advantage of replacing a four step handshake.
 
2
Allow Alice and Bob be the two participants in a quantum channel, where Alice is the sender of qubits and Bob is the receiver of qubits. The horizontal polarizations and the vertical polarizations (defined in Sect. 6.2) are required to create or calculate qubits.
 
3
QKD uses quantum mechanics to promise safe message through by quantum superposition states (defined in Sects. 4.1, 4.2 and 6.2) [811, 1720, 2528].
 
Literatur
1.
Zurück zum Zitat Neuman, B., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 33–38 (1994)CrossRef Neuman, B., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 33–38 (1994)CrossRef
2.
Zurück zum Zitat Kohl, J.T.: The evolution of the Kerberos authentication service. In: EurOpen Conference Proceedings, pp. 295–313 (1991) Kohl, J.T.: The evolution of the Kerberos authentication service. In: EurOpen Conference Proceedings, pp. 295–313 (1991)
3.
Zurück zum Zitat Li, G.: Efficient network authentication protocols: lower bounds and optimal implementations. Distrib. Comput. 9(3), 131–145 (1995)CrossRef Li, G.: Efficient network authentication protocols: lower bounds and optimal implementations. Distrib. Comput. 9(3), 131–145 (1995)CrossRef
4.
Zurück zum Zitat Wen, H.A., Lee, T.F., Hwang, T.: A provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proc. Commun. 152(2), 138–143 (2005)CrossRefMATH Wen, H.A., Lee, T.F., Hwang, T.: A provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proc. Commun. 152(2), 138–143 (2005)CrossRefMATH
5.
Zurück zum Zitat Nam, J., Cho, S., Kim, S., Won, D.: Simple and efficient group key agreement based on factoring. In: Proceedings of International Conference on Computational Science and Its Applications (ICCSA ’04), pp. 645–654 (2004) Nam, J., Cho, S., Kim, S., Won, D.: Simple and efficient group key agreement based on factoring. In: Proceedings of International Conference on Computational Science and Its Applications (ICCSA ’04), pp. 645–654 (2004)
6.
Zurück zum Zitat Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: Proceedings of 27th ACM Symposium Theory of Computing, pp. 57–66 (1995) Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: Proceedings of 27th ACM Symposium Theory of Computing, pp. 57–66 (1995)
7.
Zurück zum Zitat Kehne, A., Schonwalder, J., Langendorfer, H.: A nonce-based protocol for multiple authentications. ACM Oper. Syst. Rev. 26(4), 84–89 (1992)CrossRef Kehne, A., Schonwalder, J., Langendorfer, H.: A nonce-based protocol for multiple authentications. ACM Oper. Syst. Rev. 26(4), 84–89 (1992)CrossRef
8.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference Computers, Systems, and Signal Processing, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference Computers, Systems, and Signal Processing, pp. 175–179 (1984)
10.
Zurück zum Zitat Hwang, W.Y., Koh, I.G., Han, Y.D.: Quantum cryptography without public announcement of bases. Phys. Lett. A 244, 489–494 (1998)CrossRefADSMATH Hwang, W.Y., Koh, I.G., Han, Y.D.: Quantum cryptography without public announcement of bases. Phys. Lett. A 244, 489–494 (1998)CrossRefADSMATH
11.
Zurück zum Zitat Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 22–23 (2000) Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 22–23 (2000)
12.
Zurück zum Zitat Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007) Hwang, T., Lee, K.-C., Li, C.-M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71–80 (2007)
13.
Zurück zum Zitat Elsevier (n.d). Fundamentals of spread-spectrum techniques. Elsevier, pp. 153–194. MérouaneDebbah, “Short introduction to OFDM”. Supelec, pp. 1–11 (2002) Elsevier (n.d). Fundamentals of spread-spectrum techniques. Elsevier, pp. 153–194. MérouaneDebbah, “Short introduction to OFDM”. Supelec, pp. 1–11 (2002)
14.
Zurück zum Zitat Huang, X., Wijesekera, S., Sharma, D.: Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network. ISBN 978-3-902613-51-6. 0 (0), pp. 1–17 (2009) Huang, X., Wijesekera, S., Sharma, D.: Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network. ISBN 978-3-902613-51-6. 0 (0), pp. 1–17 (2009)
15.
Zurück zum Zitat Mink, Alan, Frankel, Sheila, Perlner, Ray: Quantum key distribution (QKD) and commodity security protocols: introduction and integration. Int. J. Netw. Secur. Appl. 1(2), 1–12 (2009) Mink, Alan, Frankel, Sheila, Perlner, Ray: Quantum key distribution (QKD) and commodity security protocols: introduction and integration. Int. J. Netw. Secur. Appl. 1(2), 1–12 (2009)
16.
Zurück zum Zitat Thayananthan, V., Alzahran, A.: Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks. IJCA Special Issue on “Network Security and Cryptography” NSC, p1-1 (2011) Thayananthan, V., Alzahran, A.: Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks. IJCA Special Issue on “Network Security and Cryptography” NSC, p1-1 (2011)
17.
Zurück zum Zitat Einstein, A., Podolsky, P., Rosen, S.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777–780 (1935)CrossRefADSMATH Einstein, A., Podolsky, P., Rosen, S.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777–780 (1935)CrossRefADSMATH
18.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–190 (2002)CrossRefADS Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–190 (2002)CrossRefADS
19.
Zurück zum Zitat Hughes, R.J., Luther, G.G., Morgan, G.L., Peterson, C.G., Simmons, C.: Quantum cryptography over underground optical fibers. In: Proceedings of Advances in Cryptology (CRYPTO ’96), pp. 329–342 (1996) Hughes, R.J., Luther, G.G., Morgan, G.L., Peterson, C.G., Simmons, C.: Quantum cryptography over underground optical fibers. In: Proceedings of Advances in Cryptology (CRYPTO ’96), pp. 329–342 (1996)
20.
21.
Zurück zum Zitat Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)CrossRefMATH Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)CrossRefMATH
22.
Zurück zum Zitat Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457 (2003)MathSciNetCrossRefMATH Gottesman, D., Lo, H.-K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49, 457 (2003)MathSciNetCrossRefMATH
23.
Zurück zum Zitat Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1992)CrossRefADS Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1992)CrossRefADS
24.
Zurück zum Zitat Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Hélie, S.: Integration of quantum cryptography in 802.11 networks. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), pp. 116–123, Vienna (2006) Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Hélie, S.: Integration of quantum cryptography in 802.11 networks. In: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), pp. 116–123, Vienna (2006)
25.
Zurück zum Zitat Gong, Li-Hua, Song, Han-Chong, He, Chao-Sheng, Liu, Ye, Zhou, Nan-Run: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)CrossRefADS Gong, Li-Hua, Song, Han-Chong, He, Chao-Sheng, Liu, Ye, Zhou, Nan-Run: A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 89(3), 035101 (2014)CrossRefADS
26.
Zurück zum Zitat Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81(4), 045009 (2010)CrossRefADSMATH Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81(4), 045009 (2010)CrossRefADSMATH
27.
Zurück zum Zitat Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Novel quantum deterministic key distribution protocols with entangled states. Int. J. Theor. Phys. 49(9), 2035–2044 (2010)MathSciNetCrossRefMATH Zhou, Nan-Run, Wang, Li-Jun, Ding, Jie, Gong, Li-Hua: Novel quantum deterministic key distribution protocols with entangled states. Int. J. Theor. Phys. 49(9), 2035–2044 (2010)MathSciNetCrossRefMATH
28.
Zurück zum Zitat Zhou, Nan-Run, Wang, Li-Jun, Gong, Li-Hua, Zuo, Xiangwu, Liu, Ye: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)CrossRefADS Zhou, Nan-Run, Wang, Li-Jun, Gong, Li-Hua, Zuo, Xiangwu, Liu, Ye: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)CrossRefADS
Metadaten
Titel
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
verfasst von
R. Lalu Naik
P. Chenna Reddy
Publikationsdatum
01.12.2015
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 12/2015
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-1129-3

Weitere Artikel der Ausgabe 12/2015

Quantum Information Processing 12/2015 Zur Ausgabe

Neuer Inhalt