Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol

被引:0
|
作者
Ghilen, Aymen [1 ]
Azizi, Mostafa [2 ]
Bouallegue, Ridha [3 ]
机构
[1] Natl Engn Sch Tunis, Tunis, Tunisia
[2] Univ Mohammed Ist Oujda, ESTO, Lab MATSI, Dept Comp Engn, Oujda, Morocco
[3] Higher Sch Commun, Innovcom Lab, Aryanah, Tunisia
来源
2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2015年
关键词
Quantum Authentication; Quantum Key Distribution; Entanglement; Bell States; CHAP; PRISM; Model Checking;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we intend through our present paper to introduce a new quantum extension of CHAP that integrates quantum cryptography and takes advantage of its benefits such as eavesdropping detection, random secret key generation and unconditional security. A new scheme using a previously shared entangled qubits pairs with quantum unitary operators to ensure key agreement and mutual authentication is performed. To analyze the security of the proposed protocol, we use the PRISM tool as a model checker. We particularly focus on the security property of minimizing the quantity of information about the key that an enemy can obtain from applying a "man in the middle" attack. If we act on the parameters of the channel and the eavesdropper, we prove that this security property is affected by varying the efficiency of the channel as well as the power of the enemy. More interestingly, we show that the enemy could never be able to retrieve the value of the key.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Incorporation and Model Checking of a Quantum Authentication and Key Distribution Scheme in EAP-TLS
    Ghilen, Aymen
    Belmabrouk, Hafedh
    Azizi, Mostafa
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 457 - 467
  • [22] Finite-key security analysis for multilevel quantum key distribution
    Bradler, Kamil
    Mirhosseini, Mohammad
    Fickler, Robert
    Broadbent, Anne
    Boyd, Robert
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [23] Security-Enhanced WireGuard Protocol Design using Quantum Key Distribution
    Chen, Lutong
    Xue, Kaiping
    Li, Jian
    Li, Zhonghui
    Yu, Nenghai
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 718 - 723
  • [24] Security of a High Dimensional Two-Way Quantum Key Distribution Protocol
    Krawec, Walter O.
    ADVANCED QUANTUM TECHNOLOGIES, 2022, 5 (10)
  • [25] Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution
    Ghilen, Aymen
    Azizi, Mostafa
    Bouallegue, Ridha
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 238 - 247
  • [26] A Key Verification Protocol for Quantum Key Distribution
    Kurt, Gunes Karabulut
    Ozdemir, Enver
    Ozkirisci, Neslihan Aysen
    Topal, Ozan Alp
    IEEE ACCESS, 2019, 7 : 141386 - 141394
  • [27] Effect of pseudo-random number on the security of quantum key distribution protocol
    Yang, Xiao-Liang
    Li, Yu-Qing
    Li, Hong-Wei
    CHINESE PHYSICS B, 2025, 34 (02)
  • [28] On the Security of Quantum Key Distribution Networks
    Lella, Eufemia
    Schmid, Giovanni
    CRYPTOGRAPHY, 2023, 7 (04)
  • [29] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888
  • [30] A Proof of the Security of Quantum Key Distribution
    Eli Biham
    Michel Boyer
    P. Oscar Boykin
    Tal Mor
    Vwani Roychowdhury
    Journal of Cryptology, 2006, 19 : 381 - 439