Improving the Security of CHAP Protocol by Quantum Cryptography

被引:0
|
作者
Elboukhari, Mohamed [1 ]
Azizi, Mostafa [2 ]
Azizi, Abdelmalek [3 ]
机构
[1] Univ Mohamed Ist, FSO, Dept Math & Comp Sci, Oujda, Morocco
[2] Univ Mohamed, ESTO, Dept app Engn, Oujda, Morocco
[3] Acad Hassan II Sci & Tech, Oujda, Morocco
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Quantum Cryptography or Quantum key distribution (QKD) is new method that allows the secure distribution of a bit string, used as key in cryptographic protocols. Extensive researches have been undertaken on Quantum Cryptography since it was noted that quantum computers could break public key cryptosystems based on number theory. Quantum Cryptography offers unconditionally secure communication based on laws of quantum physics. Actually, there is a strong need of research to use this technology in the existing communication networks. We explore in this paper, the possibility of exploiting QKD in the authentication process for local area networks (LANs). Precisely, we have elaborated a scheme to integrate the new technique of QKD in the CHAP protocol (Challenge Handshake Authentication Protocol) to enhance the security of the authentication service.
引用
收藏
页码:241 / +
页数:2
相关论文
共 50 条
  • [31] Bounds on information and the security of quantum cryptography
    Biham, E
    Mor, T
    PHYSICAL REVIEW LETTERS, 1997, 79 (20) : 4034 - 4037
  • [32] Quantum Cryptography - The Analysis of Security Requirements
    Niemiec, Marcin
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
  • [33] Quantum Cryptography for Internet of Things Security
    Alekha Parimal Bhatt
    Anand Sharma
    Journal of Electronic Science and Technology, 2019, (03) : 213 - 220
  • [34] Security against eavesdropping in quantum cryptography
    Lutkenhaus, N
    Barnett, SM
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT, 1997, : 89 - 98
  • [35] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [36] Key Distribution Protocol on Quantum Cryptography
    Makanda, Kondwani
    Jeon, Jun-Cheol
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [37] Quantum cryptography with floating basis protocol
    Kurochkin, Y
    QUANTUM INFORMATICS 2004, 2004, 5833 : 213 - 221
  • [38] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [39] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [40] Improving Bio-Cryptography Authentication Protocol
    Fadil, Irfan
    Barmawi, Ari Moesriami
    2015 9TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2015,