Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

被引:7
作者
Ghashghaei, Farshad Rahimi [1 ]
Ahmed, Yussuf [1 ]
Elmrabit, Nebrase [2 ]
Yousefi, Mehdi [3 ]
机构
[1] Birmingham City Univ, Sch Comp & Digital Technol, Birmingham B4 7XG, England
[2] Glasgow Caledonian Univ, Dept Cyber Secur & Networks, Glasgow G4 0BA, Scotland
[3] 12 Riverview Pl, Glasgow G5 8EH, Scotland
关键词
post-quantum cryptography; quantum key distribution; NIST; CRYSTALS-Kyber; CRYSTALS-Dilithium; Falcon; Qiskit;
D O I
10.3390/computers13070163
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which can solve classical problems rapidly. PQC schemes address critical security challenges in QKD, particularly in authentication and encryption, to ensure the reliable communication across quantum and classical channels. The other objective of this study is to balance security and communication speed among various PQC algorithms in different security levels, specifically CRYSTALS-Kyber, CRYSTALS-Dilithium, and Falcon, which are finalists in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography Standardization project. The quantum channel of QKD is simulated with Qiskit, which is a comprehensive and well-supported tool in the field of quantum computing. By providing a detailed analysis of the performance of these three algorithms with Rivest-Shamir-Adleman (RSA), the results will guide companies and organizations in selecting an optimal combination for their QKD systems to achieve a reliable balance between efficiency and security. Our findings demonstrate that the implemented PQC schemes effectively address security challenges posed by quantum computers, while keeping the the performance similar to RSA.
引用
收藏
页数:25
相关论文
共 60 条
[41]  
Patel N.A., 2019, Int. J. Comput. Inf. Eng, V13, P496
[42]   Modified BB84 quantum key distribution protocol robust to source imperfections [J].
Pereira, Margarida ;
Curras-Lorenzo, Guillermo ;
Navarrete, Alvaro ;
Mizutani, Akihiro ;
Kato, Go ;
Curty, Marcos ;
Tamaki, Kiyoshi .
PHYSICAL REVIEW RESEARCH, 2023, 5 (02)
[43]  
Pope G., 2024, GiacomoPope/dilithium-py
[44]  
Pope G., 2024, GiacomoPope/kyber-py
[45]  
Prest T., 2024, tprest/falcon.py
[46]  
Python Software Foundation, 2000, Time-Time Access and Conversions-Python 3.7.2 Documentation
[47]   Practical Public Template Attack Attacks on CRYSTALS-Dilithium With Randomness Leakages [J].
Qiao, Zehua ;
Liu, Yuejun ;
Zhou, Yongbin ;
Ming, Jingdian ;
Jin, Chengbin ;
Li, Huizhong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :1-14
[48]   Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors [J].
Sanal, Pakize ;
Karagoz, Emrah ;
Seo, Hwajeong ;
Azarderakhsh, Reza ;
Mozaffari-Kermani, Mehran .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II, 2021, 399 :424-440
[49]  
Seo E.Y., 2022, Report 2022/1495
[50]   Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism [J].
Seyhan, Kuebra ;
Akleylek, Sedat .
PEERJ COMPUTER SCIENCE, 2023, 9