Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution

被引:1
|
作者
Alhazmi, Shatha [1 ]
Kandel, Prashanna [1 ]
Sabovik, Jayne [1 ]
Matondo-Mvula, Nadine [1 ]
Elleithy, Khaled [1 ]
机构
[1] Univ Bridgeport, Dept Comp Sci & Engn, Bridgeport, CT 06604 USA
关键词
Quantum Key Distribution (QKD); Post-Quantum Cryptography (PQC); Man-In-The-Middle Attack (MITM); Quantum Computing; Encryption; Quantum Cryptography; Falcon);
D O I
10.1109/LISAT58403.2023.10179560
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a man-in-the-middle attack. This paper examines how the man-in-the-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption to mitigate a man-in-the-middle attack, thusly protecting the communication from the eavesdropper.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence
    Hu, Bowen
    He, Weiyang
    Wang, Si
    Liu, Wenye
    Chang, Chip-Hong
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [42] Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions
    Nayak, Gopi Nath
    Samaddar, Shefalika Ghosh
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 491 - 495
  • [43] Wireless intrusion detection and response - A case study using the classic man-in-the-middle attack
    Schmoyer, TR
    Lim, YX
    Owen, HL
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 883 - 888
  • [44] 论Man-in-the-Middle Attack对“云”资源威胁
    王天明
    网络安全技术与应用, 2012, (02) : 37 - 39
  • [45] Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack
    Li, Xiaohong
    Li, Shuxin
    Hao, Jianye
    Feng, Zhiyong
    An, Bo
    THIRTY-FIRST AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 593 - 599
  • [46] Advanced Protocol to Prevent Man-in-the-middle Attack in SCADA System
    Oh, Sangkyo
    Chung, Hyunji
    Lee, Sangjin
    Lee, Kyungho
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (02): : 1 - 8
  • [47] On Man-in-the-Middle Attack Risks of the VPN Gate Relay System
    Sun, Yunxiao
    Wang, Bailing
    Wang, Chao
    Wei, Yuliang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] The Man-in-the-Middle Defence
    Anderson, Ross
    Bond, Mike
    SECURITY PROTOCOLS, 2009, 5087 : 153 - 156
  • [49] VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"
    Abidin, Aysajan
    Larsson, Jan-Ake
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2009, 7 (05) : 1047 - 1052
  • [50] AUTOMATED MAN-IN-THE-MIDDLE ATTACK AGAINST WI-FI NETWORKS
    Vondracek, Martin
    Pluskal, Jan
    Rysavy, Ondrej
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2018, 13 (01) : 59 - 80