Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security

被引:0
|
作者
Sykot, Arman [1 ]
Azad, Shawmoon [1 ]
Tanha, Wahida Rahman [1 ]
Morshed, B. M. Monjur [1 ]
Shubha, Syed Emad Uddin [1 ]
Mahdy, M. R. C. [1 ]
机构
[1] North South Univ, Dept Elect & Comp Engn, Bashundhara R-A, Dhaka 1229, Bangladesh
关键词
Quantum key distribution(QKD); Entanglement; Advanced encryption standard (AES); Secure hash algorithm (SHA); Steganography;
D O I
10.1016/j.aej.2025.02.056
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This research introduces a novel cryptographic system that enhances the security of steganographic images by integrating Quantum Key Distribution (QKD) with traditional encryption. Using the E91 QKD protocol, it generates a shared secret key between parties, leveraging quantum entanglement to provide superior protection against eavesdropping. The quantum key is then hashed with the Secure Hash Algorithm (SHA) to produce a fixed-length, high-entropy key for symmetric encryption. The Advanced Encryption Standard (AES) is employed to encrypt steganographic images, which conceal critical data within digital images, adding an extra layer of security through obscurity. Experiments with images of varying resolutions (64 x 64 to 512 x 512 pixels) show consistent encryption performance. The encrypted images exhibit high randomness, with an average entropy of 7.9929. Differential attack resilience is demonstrated by a Number of Pixels Change Rate (NPCR) averaging 99.6928% and a Unified Average Changing Intensity (UACI) of 56.1549%. The average E91 protocol key generation time is 5.78 s with a key rate of 7.43 bps. Encryption and decryption times for test images are 0.00149 and 0.00175 s, respectively. This research combines quantum and classical cryptography with steganography, providing a robust security framework highly resistant to both quantum and classical threats.
引用
收藏
页码:167 / 182
页数:16
相关论文
共 39 条
  • [31] Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment
    Sasikumar, S.
    Sundar, K.
    Jayakumar, C.
    Obaidat, Mohammad S.
    Stephan, Thompson
    Hsiao, Kuei-Fang
    SIMULATION MODELLING PRACTICE AND THEORY, 2022, 121
  • [32] Security-proof framework for two-way Gaussian quantum-key-distribution protocols
    Zhuang, Quntao
    Zhang, Zheshen
    Lutkenhaus, Norbert
    Shapiro, Jeffrey H.
    PHYSICAL REVIEW A, 2018, 98 (03)
  • [33] Security analysis of satellite-to-ground reference-frame-independent quantum key distribution with beam wandering
    Zhou, Chun
    Zhao, Yan-Mei
    Yang, Xiao-Liang
    Lu, Yi-Fei
    Zhou, Yu
    Jiang, Xiao-Lei
    Wang, Hai-Tao
    Wang, Yang
    Li, Jia-Ji
    Jiang, Mu-Sheng
    Wan, Xiang
    Zhang, Hai-Long
    Li, Hong-Wei
    Bao, Wan-Su
    CHINESE PHYSICS B, 2024, 33 (08)
  • [34] Composable security of two-way continuous-variable quantum key distribution without active symmetrization
    Ghorai, Shouvik
    Diamanti, Eleni
    Leverrier, Anthony
    PHYSICAL REVIEW A, 2019, 99 (01)
  • [35] Quantum Key Distribution for Security Guarantees Over QoS-Driven 3D Satellite Networks
    Wang, Ping
    Zhang, Xi
    Chen, Genshe
    Khanh Pham
    Blasch, Erik
    SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII, 2014, 9085
  • [36] Quantum Key Distribution for Security Guarantees Over Quantum-Repeater-Based QoS-Driven 3D Satellite Networks
    Wang, Ping
    Zhang, Xi
    Chen, Genshe
    Pham, Khanh
    Blasch, Erik
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 728 - 733
  • [37] CPSR-HQKDN: A Hybrid Trusted Relay Quantum Key Distribution Network Routing Scheme Based on Classification of Packet Security Requirements
    Bi, Lin
    Wu, Weijie
    Yuan, Xiaotong
    Miao, Minghui
    Di, Xiaoqiang
    Jiang, Zhengang
    APPLIED SCIENCES-BASEL, 2023, 13 (22):
  • [38] Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks
    Chen, Ziyang
    Zhang, Yichen
    Wang, Gan
    Li, Zhengyu
    Guo, Hong
    PHYSICAL REVIEW A, 2018, 98 (01)
  • [39] Design and Security Analysis of Quantum Key Distribution Protocol Over Free-Space Optics Using Dual-Threshold Direct-Detection Receiver
    Trinh, Phuc V.
    Pham, Thanh V.
    Dang, Ngoc T.
    Hung Viet Nguyen
    Ng, Soon Xin
    Pham, Anh T.
    IEEE ACCESS, 2018, 6 : 4159 - 4175