Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security

被引:0
|
作者
Sykot, Arman [1 ]
Azad, Shawmoon [1 ]
Tanha, Wahida Rahman [1 ]
Morshed, B. M. Monjur [1 ]
Shubha, Syed Emad Uddin [1 ]
Mahdy, M. R. C. [1 ]
机构
[1] North South Univ, Dept Elect & Comp Engn, Bashundhara R-A, Dhaka 1229, Bangladesh
关键词
Quantum key distribution(QKD); Entanglement; Advanced encryption standard (AES); Secure hash algorithm (SHA); Steganography;
D O I
10.1016/j.aej.2025.02.056
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This research introduces a novel cryptographic system that enhances the security of steganographic images by integrating Quantum Key Distribution (QKD) with traditional encryption. Using the E91 QKD protocol, it generates a shared secret key between parties, leveraging quantum entanglement to provide superior protection against eavesdropping. The quantum key is then hashed with the Secure Hash Algorithm (SHA) to produce a fixed-length, high-entropy key for symmetric encryption. The Advanced Encryption Standard (AES) is employed to encrypt steganographic images, which conceal critical data within digital images, adding an extra layer of security through obscurity. Experiments with images of varying resolutions (64 x 64 to 512 x 512 pixels) show consistent encryption performance. The encrypted images exhibit high randomness, with an average entropy of 7.9929. Differential attack resilience is demonstrated by a Number of Pixels Change Rate (NPCR) averaging 99.6928% and a Unified Average Changing Intensity (UACI) of 56.1549%. The average E91 protocol key generation time is 5.78 s with a key rate of 7.43 bps. Encryption and decryption times for test images are 0.00149 and 0.00175 s, respectively. This research combines quantum and classical cryptography with steganography, providing a robust security framework highly resistant to both quantum and classical threats.
引用
收藏
页码:167 / 182
页数:16
相关论文
共 50 条
  • [41] The quest for complete security: An empirical analysis of users' multi-layered protection from security threats
    Crossler, Robert E.
    Belanger, France
    Ormond, Dustin
    INFORMATION SYSTEMS FRONTIERS, 2019, 21 (02) : 343 - 357
  • [42] Manipulating photon coherence to enhance the security of distributed phase reference quantum key distribution
    Roberts, George L.
    Lucamarini, Marco
    Dynes, James F.
    Savory, Seb J.
    Yuan, Zhiliang
    Shields, Andrew J.
    APPLIED PHYSICS LETTERS, 2017, 111 (26)
  • [43] The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
    Robert E. Crossler
    France Bélanger
    Dustin Ormond
    Information Systems Frontiers, 2019, 21 : 343 - 357
  • [44] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):
  • [45] The security and recent technology of quantum key distribution
    Wang X.-B.
    Ying H.
    Ma H.-X.
    Peng C.-Z.
    Yang T.
    Pan J.-W.
    Frontiers of Physics in China, 2006, 1 (3): : 251 - 255
  • [46] Security analysis of quantum key distribution protocol
    Omine T.
    Yamada C.
    Miyagi K.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2016, 136 (10) : 698 - 702
  • [47] Security of quantum key distribution with imperfect devices
    Gottesman, D
    Lo, HK
    Lütkenhaus, N
    Preskill, J
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 136 - 136
  • [48] Quantum key distribution: Security, feasibility and robustness
    Wang, Xiang-Bin
    QUANTUM COMPUTATION AND INFORMATION: FROM THEORY TO EXPERIMENT, 2006, 102 : 185 - 233
  • [49] Upgrading PPP security by quantum key distribution
    Ghernaouti-Helie, Solange
    Sfaxi, Mohamed Ali
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, IV, 2007, 229 : 45 - +
  • [50] Post Quantum Public and Private Key Cryptography Optimized for IoT Security
    Kaushik, Ajay
    Vadlamani, Lakshmi Sai Srikar
    Hussain, Mohammed Mohsin
    Sahay, Milind
    Singh, Rahul
    Singh, Ananya Komal
    Indu, S.
    Goswami, Puneet
    Kousik, Nalliyanna Goundar Veerappan
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (02) : 893 - 909