Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security

被引:0
|
作者
Sykot, Arman [1 ]
Azad, Shawmoon [1 ]
Tanha, Wahida Rahman [1 ]
Morshed, B. M. Monjur [1 ]
Shubha, Syed Emad Uddin [1 ]
Mahdy, M. R. C. [1 ]
机构
[1] North South Univ, Dept Elect & Comp Engn, Bashundhara R-A, Dhaka 1229, Bangladesh
关键词
Quantum key distribution(QKD); Entanglement; Advanced encryption standard (AES); Secure hash algorithm (SHA); Steganography;
D O I
10.1016/j.aej.2025.02.056
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This research introduces a novel cryptographic system that enhances the security of steganographic images by integrating Quantum Key Distribution (QKD) with traditional encryption. Using the E91 QKD protocol, it generates a shared secret key between parties, leveraging quantum entanglement to provide superior protection against eavesdropping. The quantum key is then hashed with the Secure Hash Algorithm (SHA) to produce a fixed-length, high-entropy key for symmetric encryption. The Advanced Encryption Standard (AES) is employed to encrypt steganographic images, which conceal critical data within digital images, adding an extra layer of security through obscurity. Experiments with images of varying resolutions (64 x 64 to 512 x 512 pixels) show consistent encryption performance. The encrypted images exhibit high randomness, with an average entropy of 7.9929. Differential attack resilience is demonstrated by a Number of Pixels Change Rate (NPCR) averaging 99.6928% and a Unified Average Changing Intensity (UACI) of 56.1549%. The average E91 protocol key generation time is 5.78 s with a key rate of 7.43 bps. Encryption and decryption times for test images are 0.00149 and 0.00175 s, respectively. This research combines quantum and classical cryptography with steganography, providing a robust security framework highly resistant to both quantum and classical threats.
引用
收藏
页码:167 / 182
页数:16
相关论文
共 50 条
  • [31] A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography
    Abu-Faraj, Mua'ad
    Al-Hyari, Abeer
    Alqadi, Ziad
    SYMMETRY-BASEL, 2022, 14 (04):
  • [32] A Review of Security Evaluation of Practical Quantum Key Distribution System
    Sun, Shihai
    Huang, Anqi
    ENTROPY, 2022, 24 (02)
  • [33] Proof of security of quantum key distribution with two-way classical communications
    Gottesman, D
    Lo, HK
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) : 457 - 475
  • [34] Composable security for practical quantum key distribution with two way classical communication
    Jiang, Cong
    Hu, Xiao-Long
    Yu, Zong-Wen
    Wang, Xiang-Bin
    NEW JOURNAL OF PHYSICS, 2021, 23 (06)
  • [35] Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution
    A. Ahilan
    A. Jeyam
    Wireless Personal Communications, 2023, 129 : 549 - 567
  • [36] Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution
    Ahilan, A.
    Jeyam, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (01) : 549 - 567
  • [37] Multi-layered covert QR codes for increased capacity and security
    Meruga, Jeevan M.
    Fountain, Carly
    Kellar, Jon
    Crawford, Grant
    Baride, Aravind
    May, P. Stanley
    Cross, William
    Hoover, Randy
    International Journal of Computers and Applications, 2015, 37 (01) : 17 - 27
  • [38] Multi-Layered Virtual Machines for Security Updates in Grid Environments
    Schwarzkopf, Roland
    Schmidt, Matthias
    Fallenbeck, Niels
    Freisleben, Bernd
    2009 35TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, PROCEEDINGS, 2009, : 563 - 570
  • [39] Formal Analysis Approach for Multi-layered System Safety and Security Co-engineering
    Quamara, Megha
    Pedroza, Gabriel
    Hamid, Brahim
    DEPENDABLE COMPUTING, EDCC 2022 WORKSHOPS, 2022, 1656 : 18 - 31
  • [40] 6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features
    Glissa, Ghada
    Meddeb, Aref
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 264 - 269