Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution

被引:1
|
作者
Alhazmi, Shatha [1 ]
Kandel, Prashanna [1 ]
Sabovik, Jayne [1 ]
Matondo-Mvula, Nadine [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Quantum Key Distribution (QKD); Post-Quantum Cryptography (PQC); Man-In-The-Middle Attack (MITM); Quantum Computing; Encryption; Quantum Cryptography; Falcon);
D O I
10.1109/LISAT58403.2023.10179560
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a man-in-the-middle attack. This paper examines how the man-in-the-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption to mitigate a man-in-the-middle attack, thusly protecting the communication from the eavesdropper.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Quantum man-in-the-middle attack on the calibration process of quantum key distribution
    Fei, Yang-Yang
    Meng, Xiang-Dong
    Gao, Ming
    Wang, Hong
    Ma, Zhi
    SCIENTIFIC REPORTS, 2018, 8
  • [2] Quantum man-in-the-middle attack on the calibration process of quantum key distribution
    Yang-Yang Fei
    Xiang-Dong Meng
    Ming Gao
    Hong Wang
    Zhi Ma
    Scientific Reports, 8
  • [3] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923
  • [4] Man-in-the-middle attack on quantum secure communications with authentication
    Tzu Han Lin
    Tzonelish Hwang
    Quantum Information Processing, 2014, 13 : 917 - 923
  • [5] Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack
    Anna M. Johnston
    Peter S. Gemmell
    Journal of Cryptology, 2002, 15 : 139 - 148
  • [6] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [7] An Alternative Approach of Mitigating ARP Based Man-in-the-Middle Attack Using Client Site Bash Script
    Amin, A. A. M. Mazharul
    Mahamud, Md Sadad
    2019 6TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2019), 2019, : 112 - 115
  • [8] Optimal Man-In-The-Middle Stealth Attack
    Faramondi, Luca
    Oliva, Gabriele
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
  • [9] Man-in-the-Middle Attack in HTTP/2
    Patni, Parth
    Iyer, Kartik
    Sarode, Rohan
    Mali, Amit
    Nimkar, Anant
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [10] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81