9 research outputs found

    SSK Initiated by Third Party and Superposition Submissions

    Get PDF
    The Quantum Key Distribution QKD Protocol is a technical tool that helps to create a shared secret key (SSK) between communicated users. Moreover, to guarantee any connection over the internet, users should share an encrypted information as well as a decrypted cipher-text by a secret key. Furthermore, the QKD is a mechanism that creates a secret key into a secure mode. This poster shows an improvement of QKD protocol that is created by a connection with a trusted third party as well as the sender and receiver

    Simultaneous Initiating EPR and Quantum Channel by AK15 Protocol

    Get PDF
    The Quantum Key Distribution is a technique to create a secret key, which is used to encode and decode the transferred data between sender and receiver. AK15 protocol was presented to stand against some quantum attacks. One of these attacks is Man-In-The-Middle Attack (MIMA), where it takes an advantage of missing the authentication between the communicated parties. The AK15 sets up a confidence connection by submitting an EPR pair before using a quantum channel. The AK15 has ability to utilize a classical channel in limited usage. Also, the data that should be sent by the classical channel is unknown even an eavesdropper compromised it. The reality of robust this technique because the data submitted by the classical channel represents the type of gate that gives the receiver a chance to figure the qubits without extra communications

    Security of Quantum Key Distribution

    Get PDF
    © ASEE 2015Every day, the world looks on more of security analysis needs that are based on the enormous and sensitive information. This datum is shared by different systems around the world, which are considered at risk of attack at any time. Many scientists and researchers have brought up another cryptographic subject in Quantum Computing that is so-called Quantum Key Distribution (QKD) protocol. The first QKD is BB84 that was presented by Charles Bennett and Gilles Brassard in 1984. After that, several protocols were created sequentially with the same or different mechanism and with some abilities of these protocols to stand against well-known quantum attacks. This paper studies these protocols deeply and compares them to find the strong and weak points in each considered protocols

    QKD initiated by Authentication of EPR in 3 way channel

    Get PDF
    Quantum key distribution (QKD) is one of the recent revolutions in cryptography field that was announced in first by Charles Bennett and Gilles Brassard in 1984. Here we create another QKD protocol that based on the three channel to communicate between two parties, and also ensures the connection is never established without providing the right identity in the first channel. Therefore, using the EPR pair in the first channel to approve the authentication in short time

    A New QKD Protocol Based Upon Authentication By EPR Entanglement State

    Get PDF
    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles’ movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the inability to provide the authentication between the end users during the quantum and classical channels. The proposed QKD protocol was designed to utilize some advantages of quantum physics as well as solid functions that are used in the classical cryptography. The authentication is a requirement during different communication channels, where both legitimate parties must confirm their identities before starting to submit data (plain-text). Moreover, the protocol uses most needed scenarios to finish the communication without leaking important data. These scenarios have been approved in existing QKD protocols either by classical or quantum systems. The matrix techniques also are used as a part of the preparation of the authentication key, where the end users communicate by an EPR (related to Einstein, Podolsky, and Rosen theory in 1935) channel. The EPR channel will be supported by an entanglement of particles. If the EPR communication succeeded, transferring the converted plain-text is required. Finally, both end users will have an authenticated secret key, and the submission will be done without any interruption

    Simultaneous Initiating EPR and Quantum Channel by Quantum Key Distribution Protocol

    Get PDF
    Cryptography is the background of protecting the flowed information between various communicated parties. Quantum cryptography gives the extreme trust to transferred information by creating a unique secret key that is based upon the law of physics. This paper will discuss a novel algorithm that is presented through quantum key distribution (QKD) protocol. This QKD protocol depends on parallel quantum communications between participants within EPR and quantum channels. The proposed protocol utilizes the EPR channel to prove the authentication while the quantum channel to transfer the shared key. Moreover, the proposed protocol initiates the verification of the participant’s identity between the communicators by the EPR channel. After that the transferred data into quantum channel will create the secret key that contains a string of qubits as well as no need to communicate into classical channel

    Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review

    No full text
    Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity. Quantum cryptography is one such improvement that has grown rapidly since the first announced protocol. Quantum cryptography contains substantial elements that must be addressed to ensure secure communication between legitimate parties. Quantum key distribution (QKD), a technique for creating a secret key, is one of the most interesting areas in quantum cryptography. This paper reviews some well-known quantum key distribution techniques that have been demonstrated in the past three decades. Furthermore, this paper discusses the process of creating a secret key using quantum mechanics and cryptography methods. Moreover, it explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem. An accurate quantitative comparison between the QKD protocols is presented, especially the runtime execution for each QKD protocol. In addition, the paper will demonstrate a general model of each considered QKD protocol based on security principles
    corecore