3 research outputs found
A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm
A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as a qubit and after the encoded message is transferred into photons, the polarization of each photon is rotated by an angle θj, which is chosen randomly for each qubit. The sender and receiver agree over a Hill-cipher key, the encryption occurs by utilization of the quantum three-pass protocol (QTPP), the decryption will be illustrated, and an example shows how the algorithm will work. Finally, the security of this algorithm is analyzed in detail
Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher
Based on a quantum shift register, a novel quantum block cryptographic algorithm
that can be used to encrypt classical messages is proposed. The message is encoded and decoded
by using a code generated by the quantum shift register. The security of this algorithm is
analysed in detail. It is shown that, in the quantum block cryptographic algorithm, two keys
can be used. One of them is the classical key that is used in the Hill cipher algorithm where
Alice and Bob use the authenticated Diffie Hellman key exchange algorithm using the concept
of digital signature for the authentication of the two communicating parties and so eliminate
the man-in-the-middle attack. The other key is generated by the quantum shift register and
used for the coding of the encryption message, where Alice and Bob share the key by using
the BB84 protocol. The novel algorithm can prevent a quantum attack strategy as well as
a classical attack strategy. The problem of key management is discussed and circuits for the
encryption and the decryption are suggested