Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol

被引:0
|
作者
Ghilen, Aymen [1 ]
Azizi, Mostafa [2 ]
Bouallegue, Ridha [3 ]
机构
[1] Natl Engn Sch Tunis, Tunis, Tunisia
[2] Univ Mohammed Ist Oujda, ESTO, Lab MATSI, Dept Comp Engn, Oujda, Morocco
[3] Higher Sch Commun, Innovcom Lab, Aryanah, Tunisia
来源
2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2015年
关键词
Quantum Authentication; Quantum Key Distribution; Entanglement; Bell States; CHAP; PRISM; Model Checking;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we intend through our present paper to introduce a new quantum extension of CHAP that integrates quantum cryptography and takes advantage of its benefits such as eavesdropping detection, random secret key generation and unconditional security. A new scheme using a previously shared entangled qubits pairs with quantum unitary operators to ensure key agreement and mutual authentication is performed. To analyze the security of the proposed protocol, we use the PRISM tool as a model checker. We particularly focus on the security property of minimizing the quantity of information about the key that an enemy can obtain from applying a "man in the middle" attack. If we act on the parameters of the channel and the eavesdropper, we prove that this security property is affected by varying the efficiency of the channel as well as the power of the enemy. More interestingly, we show that the enemy could never be able to retrieve the value of the key.
引用
收藏
页数:7
相关论文
共 50 条
  • [2] Integration of a quantum authenticated key distribution scheme in the EAP-TLS protocol
    Ghilen, Aymen
    Azizi, Mostafa
    Bouallegue, Ridha
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [3] Security of "asymmetrical quantum key distribution protocol"
    Li, Chuan-Ming
    Hwang, Tzonelih
    Lee, Kuo-Chang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2007, 18 (02): : 157 - 161
  • [4] Integration of Quantum Key Distribution in the TLS Protocol
    Elboukhari, Mohamed
    Azizi, Mostafa
    Azizi, Abdelmalek
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 21 - 28
  • [5] Security analysis of continuous-variable quantum key distribution scheme
    Zhu Jun
    He Guang-Qiang
    Zeng Gui-Hua
    CHINESE PHYSICS, 2007, 16 (05): : 1364 - 1369
  • [6] Unconditional security of relativistic quantum key distribution protocol
    Zhuang, Sushuai
    Yang, Li
    QUANTUM AND NONLINEAR OPTICS, 2010, 7846
  • [7] Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
    Bhatia, Ashutosh
    Bitragunta, Sainath
    Tiwari, Kamlesh
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 926 - 943
  • [8] Simple analysis of security of the BB84 quantum key distribution protocol
    Su, Hong-Yi
    QUANTUM INFORMATION PROCESSING, 2020, 19 (06)
  • [9] Simple analysis of security of the BB84 quantum key distribution protocol
    Hong-Yi Su
    Quantum Information Processing, 2020, 19
  • [10] Quantum Key Distribution with Error Rejecting Protocol: Optical Setup and Security Analysis
    Nascimento, Jose C.
    Mendonca, Fabio A.
    Giraudo, Elvio C.
    Ramos, Rubens V.
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 668 - 671