2 research outputs found

    TrusNet: Peer-to-Peer Cryptographic Authentication

    Get PDF
    Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages. Increasingly, the Internet is being used to transfer a new kind of data which it was never designed for. In most ways, this new data type fits in naturally to the Internet, taking advantage of the near limit-less expanse of the protocol. Hardware protocols, unlike previous data types, provide a unique set security problem. Much like financial data, hardware protocols extended across the Internet must be protected with authentication. Currently, systems which do authenticate do so through a central server, utilizing a similar authentication model to the HTTPS protocol. This hierarchical model is often at odds with the needs of hardware protocols, particularly in ad-hoc networks where peer-to-peer communication is prioritized over a hierarchical model. Our project attempts to implement a peer-to-peer cryptographic authentication protocol to be used to protect hardware protocols extending over the Internet. The TrusNet project uses public-key cryptography to authenticate nodes on a distributed network, with each node locally managing a record of the public keys of nodes which it has encountered. These keys are used to secure data transmission between nodes and to authenticate the identities of nodes. TrusNet is designed to be used on multiple different types of network interfaces, but currently only has explicit hooks for Internet Protocol connections. As of June 2016, TrusNet has successfully achieved a basic authentication and communication protocol on Windows 7, OSX, Linux 14 and the Intel Edison. TrusNet uses RC-4 as its stream cipher and RSA as its public-key algorithm, although both of these are easily configurable. Along with the library, TrusNet also enables the building of a unit testing suite, a simple UI application designed to visualize the basics of the system and a build with hooks into the I/O pins of the Intel Edison allowing for a basic demonstration of the system

    Método criptográfico para cifrar información usando los estados cuánticos de polarización de fotones individuales

    Get PDF
    La teoría de información cuántica ha mejorado los sistemas de comunicación en todos los niveles, como en el almacenamiento, procesamiento, transmisión, seguridad, y capacidad de respuesta, pero es la criptografía cuántica la que tiene un crecimiento más rápido en cuanto a resultados de investigación. La criptografía cuántica es un modelo físicos para la generación y distribución de claves criptográficas, que aprovecha las propiedades de la mecánica cuántica como la superposición de estados, la polarización de fotones individuales, el entrelazamiento, la teleportación, y la codificación densa, propiedades que proporcionan ventajas computacionales para transmitir, procesar y codificar información a más alta velocidad y con mejor seguridad. Además se pueden desarrollar aplicaciones. Bajo este contexto, en este trabajo se describen los conceptos teóricos de la mecánica cuántica que permitieron simular un método criptográfico que utiliza la generación y distribución de claves cuánticas del protocolo BB84, como un sistema de intercambio de claves seguras entre un transmisor AliceyunreceptorBob.Estossistemasutilizanlaspropiedadeslaspropiedadesdelamecánicacuántica para distribuir la clave y no problemas matemáticos difíciles de resolver como los que utiliza la criptografía construida en una base de estados clásicos. Para este método criptográfico, la generación y distribución de la clave cuántica se desarrolla en dos escenarios, en el primero no se tendrá ninguna entidad que trate de interceptar la comunicación entre el transmisor y el receptor, en el segundo escenariosetendráunespíaEveenelcanalcuánticodecomunicaciónquetratarádeobtenerlaclave que se }está trasmitiendo entre Alice y Bob. La generación y distribución de la clave cuántica utilizando el protocolo BB84 con y sin espía, se mostrará en un ambiente de programación y simulación desarrollado con el lenguaje cuántico Qiskit implementado por IBM para sus computadoras cuánticas, este lenguaje se encuentra descrito en el desarrollo del método criptográfico y en el Apéndice A de este trabajo. Se explican paso a paso el funcionamiento del protocolo BB84 y como a partir de la tasa de error generada por el intruso en el canal de comunicación, el transmisor y el receptor detectan una intrusión en el sistema. Además en la simulación del modelo se muestra como al integrar claves cuánticas con cifradores como el de Vernam,Quantum information theory has improved communication systems at all levels, such as storage, processing, transmission, security, and responsiveness, but it is the quantum cryptography that has thefastestgrowthintermsofresearchresults.Quantumcryptographyisaphysicalmodelforthegeneration and distribution of cryptographic keys, which takes advantage of the properties of quantum mechanicssuchasoverlappingstates,polarizationofindividualphotons,entanglement,teleportation, anddensecoding,propertiesthatprovidecomputationaladvantagestotransmit,processandencode information at a higher speed and with better security. In addition applications can be developed for factoring numbers in polynomial time and build security systems based on quantum cryptography in order to maintain the confidentiality, integrity and availability of information. In this context, this paper presents the theoretical concepts of quantum mechanics that allowed simulating a cryptographic method that uses the generation and distribution of quantum keys of the BB84 protocol, as a system secure keys exchange between a transmitter, Alice, and a receiver, Bob, who use the properties of quantum mechanics to distribute the key and not hard-to-solve mathematical problems like those used by cryptography built on a base of classical states. For this cryptographic method, the generation and distribution of the quantum key will be developed in two scenarios, in the first one there will be no entity that tries to intestate the communication between the transmitter and the receiver, in the second scenario there will be an Eve spy in the quantum communication channel that will try to obtain the key that is being transmitted between Alice and Bob. The generation and distribution of the quantum key using the BB84 protocol with and without a spy will be displayed in a programming and simulation environment developed with the quantum language Qiskit implemented by IBM for its quantum computers, this language is described in the development of the cryptographic method and in Appendix A of this work. The operation of the BB84 protocol is explained step by step and, as from the error rate generated by the intruder in the communication channel, the transmitter and the receiver detect an intrusion into the system. In addition, the simulation of the model shows how to integrate quantum keys with ciphers such as Vernam, and you can obtain perfect security in the encoding and decoding of informatio
    corecore