Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security

被引:0
|
作者
Sykot, Arman [1 ]
Azad, Shawmoon [1 ]
Tanha, Wahida Rahman [1 ]
Morshed, B. M. Monjur [1 ]
Shubha, Syed Emad Uddin [1 ]
Mahdy, M. R. C. [1 ]
机构
[1] North South Univ, Dept Elect & Comp Engn, Bashundhara R-A, Dhaka 1229, Bangladesh
关键词
Quantum key distribution(QKD); Entanglement; Advanced encryption standard (AES); Secure hash algorithm (SHA); Steganography;
D O I
10.1016/j.aej.2025.02.056
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This research introduces a novel cryptographic system that enhances the security of steganographic images by integrating Quantum Key Distribution (QKD) with traditional encryption. Using the E91 QKD protocol, it generates a shared secret key between parties, leveraging quantum entanglement to provide superior protection against eavesdropping. The quantum key is then hashed with the Secure Hash Algorithm (SHA) to produce a fixed-length, high-entropy key for symmetric encryption. The Advanced Encryption Standard (AES) is employed to encrypt steganographic images, which conceal critical data within digital images, adding an extra layer of security through obscurity. Experiments with images of varying resolutions (64 x 64 to 512 x 512 pixels) show consistent encryption performance. The encrypted images exhibit high randomness, with an average entropy of 7.9929. Differential attack resilience is demonstrated by a Number of Pixels Change Rate (NPCR) averaging 99.6928% and a Unified Average Changing Intensity (UACI) of 56.1549%. The average E91 protocol key generation time is 5.78 s with a key rate of 7.43 bps. Encryption and decryption times for test images are 0.00149 and 0.00175 s, respectively. This research combines quantum and classical cryptography with steganography, providing a robust security framework highly resistant to both quantum and classical threats.
引用
收藏
页码:167 / 182
页数:16
相关论文
共 50 条
  • [21] On the Security of Quantum Key Distribution Networks
    Lella, Eufemia
    Schmid, Giovanni
    CRYPTOGRAPHY, 2023, 7 (04)
  • [22] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888
  • [23] Implementation Security in Quantum Key Distribution
    Zapatero, Victor
    Navarrete, lvaro
    Curty, Marcos
    ADVANCED QUANTUM TECHNOLOGIES, 2025, 8 (02)
  • [24] Security Processor with Quantum Key Distribution
    Loruenser, Thomas
    Querasser, Edwin
    Matyus, Thomas
    Peev, Momtchil
    Wolkerstorfer, Johannes
    Hutter, Michael
    Szekely, Alexander
    Wimberger, Ilse
    Pfaffel-Janser, Christian
    Neppach, Andreas
    2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, : 37 - +
  • [25] Implementation Security in Quantum Key Distribution
    Zapatero, Victor
    Navarrete, lvaro
    Curty, Marcos
    ADVANCED QUANTUM TECHNOLOGIES, 2025, 8 (02)
  • [26] On the security and confidentiality of quantum key distribution
    Al-Ghamdi, Al-Batool
    Al-Sulami, Ameenah
    Aljahdali, Asia Othman
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [27] A proof of the security of quantum key distribution
    Biham, Eli
    Boyer, Michel
    Boykin, P. Oscar
    Mor, Tal
    Roychowdhury, Vwani
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 381 - 439
  • [28] The security of practical quantum key distribution
    Scarani, Valerio
    Bechmann-Pasquinucci, Helle
    Cerf, Nicolas J.
    Dusek, Miloslav
    Luetkenhaus, Norbert
    Peev, Momtchil
    REVIEWS OF MODERN PHYSICS, 2009, 81 (03) : 1301 - 1350
  • [29] Theory of the security of quantum key distribution
    Tamaki, Kiyoshi
    Kato, Go
    NTT Technical Review, 2011, 9 (09):
  • [30] A Proof of the Security of Quantum Key Distribution
    Eli Biham
    Michel Boyer
    P. Oscar Boykin
    Tal Mor
    Vwani Roychowdhury
    Journal of Cryptology, 2006, 19 : 381 - 439