Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution

被引:1
|
作者
Alhazmi, Shatha [1 ]
Kandel, Prashanna [1 ]
Sabovik, Jayne [1 ]
Matondo-Mvula, Nadine [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Quantum Key Distribution (QKD); Post-Quantum Cryptography (PQC); Man-In-The-Middle Attack (MITM); Quantum Computing; Encryption; Quantum Cryptography; Falcon);
D O I
10.1109/LISAT58403.2023.10179560
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a man-in-the-middle attack. This paper examines how the man-in-the-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption to mitigate a man-in-the-middle attack, thusly protecting the communication from the eavesdropper.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [32] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [33] Detection and prevention of man-in-the-middle attack in iot network using regression modeling
    Sivasankari, N.
    Kamalakkannan, S.
    ADVANCES IN ENGINEERING SOFTWARE, 2022, 169
  • [34] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [35] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing
    Hypponen, Konstantin
    Haataja, Keijo M. J.
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
  • [36] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
    Hao, Guo
    Tao, Guo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134
  • [37] Research on User Authentication Scheme against the Man-in-the-Middle Attack
    Zhou, Xiancun
    Xiong, Yan
    Liu, Renjin
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 1 - 8
  • [38] A self-confirming engine for preventing man-in-the-middle attack
    Kanamori, M
    Kobayashi, T
    Yamaguchi, S
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (03) : 530 - 538
  • [39] Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Li, Haitao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 263 - +
  • [40] Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network
    Swain, Kamakshi Prashadini
    Tiwari, Amit
    Sharma, Ankush
    Chakrabarti, Saikat
    Karkare, Amey
    2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,