Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security

被引:0
|
作者
Sykot, Arman [1 ]
Azad, Shawmoon [1 ]
Tanha, Wahida Rahman [1 ]
Morshed, B. M. Monjur [1 ]
Shubha, Syed Emad Uddin [1 ]
Mahdy, M. R. C. [1 ]
机构
[1] North South Univ, Dept Elect & Comp Engn, Bashundhara R-A, Dhaka 1229, Bangladesh
关键词
Quantum key distribution(QKD); Entanglement; Advanced encryption standard (AES); Secure hash algorithm (SHA); Steganography;
D O I
10.1016/j.aej.2025.02.056
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This research introduces a novel cryptographic system that enhances the security of steganographic images by integrating Quantum Key Distribution (QKD) with traditional encryption. Using the E91 QKD protocol, it generates a shared secret key between parties, leveraging quantum entanglement to provide superior protection against eavesdropping. The quantum key is then hashed with the Secure Hash Algorithm (SHA) to produce a fixed-length, high-entropy key for symmetric encryption. The Advanced Encryption Standard (AES) is employed to encrypt steganographic images, which conceal critical data within digital images, adding an extra layer of security through obscurity. Experiments with images of varying resolutions (64 x 64 to 512 x 512 pixels) show consistent encryption performance. The encrypted images exhibit high randomness, with an average entropy of 7.9929. Differential attack resilience is demonstrated by a Number of Pixels Change Rate (NPCR) averaging 99.6928% and a Unified Average Changing Intensity (UACI) of 56.1549%. The average E91 protocol key generation time is 5.78 s with a key rate of 7.43 bps. Encryption and decryption times for test images are 0.00149 and 0.00175 s, respectively. This research combines quantum and classical cryptography with steganography, providing a robust security framework highly resistant to both quantum and classical threats.
引用
收藏
页码:167 / 182
页数:16
相关论文
共 50 条
  • [1] Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security
    Thangapandiyan, M.
    Anand, P. M. Rubesh
    Sankaran, K. Sakthidasan
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1031 - 1035
  • [2] A deep learning-driven multi-layered steganographic approach for enhanced data security
    Sanjalawe, Yousef
    Al-E'mari, Salam
    Fraihat, Salam
    Abualhaj, Mosleh
    Alzubi, Emran
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [3] A Multi-Layered Security Model for Learning Management System
    Khan, Momeen
    Naz, Tallat
    Medani, Mohammad Awad Hamad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 207 - 211
  • [4] Multi-layered based network security defense system
    Sun, Zhi-Xin
    Ren, Zhi-Guang
    Yang, Xi
    Wang, Cheng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 61 - 69
  • [5] An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems
    Upadhyay, Darshana
    Zaman, Marzia
    Joshi, Rohit
    Sampalli, Srinivas
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01): : 642 - 660
  • [6] Optimising multi-layered security screening
    David Anderson
    Journal of Transportation Security, 2021, 14 : 249 - 273
  • [7] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [8] Optimising multi-layered security screening
    Anderson, David
    JOURNAL OF TRANSPORTATION SECURITY, 2021, 14 (3-4) : 249 - 273
  • [9] Quantum computing and the security of public key cryptography
    Li, Kai
    Yan, Pei-Gen
    Cai, Qing-Yu
    FUNDAMENTAL RESEARCH, 2021, 1 (01): : 85 - 87
  • [10] Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
    Djordjevic, Ivan B.
    ENTROPY, 2022, 24 (07)