Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol

被引:0
|
作者
Ghilen, Aymen [1 ]
Azizi, Mostafa [2 ]
Bouallegue, Ridha [3 ]
机构
[1] Natl Engn Sch Tunis, Tunis, Tunisia
[2] Univ Mohammed Ist Oujda, ESTO, Lab MATSI, Dept Comp Engn, Oujda, Morocco
[3] Higher Sch Commun, Innovcom Lab, Aryanah, Tunisia
来源
2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2015年
关键词
Quantum Authentication; Quantum Key Distribution; Entanglement; Bell States; CHAP; PRISM; Model Checking;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we intend through our present paper to introduce a new quantum extension of CHAP that integrates quantum cryptography and takes advantage of its benefits such as eavesdropping detection, random secret key generation and unconditional security. A new scheme using a previously shared entangled qubits pairs with quantum unitary operators to ensure key agreement and mutual authentication is performed. To analyze the security of the proposed protocol, we use the PRISM tool as a model checker. We particularly focus on the security property of minimizing the quantity of information about the key that an enemy can obtain from applying a "man in the middle" attack. If we act on the parameters of the channel and the eavesdropper, we prove that this security property is affected by varying the efficiency of the channel as well as the power of the enemy. More interestingly, we show that the enemy could never be able to retrieve the value of the key.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] On the security and confidentiality of quantum key distribution
    Al-Ghamdi, Al-Batool
    Al-Sulami, Ameenah
    Aljahdali, Asia Othman
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [32] A proof of the security of quantum key distribution
    Biham, Eli
    Boyer, Michel
    Boykin, P. Oscar
    Mor, Tal
    Roychowdhury, Vwani
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 381 - 439
  • [33] Generalization of Quantum Key Distribution Protocol
    Khan, Muhammad Mubashir
    Xu, Jie
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 98 - 101
  • [34] Implementation Security in Quantum Key Distribution
    Zapatero, Victor
    Navarrete, lvaro
    Curty, Marcos
    ADVANCED QUANTUM TECHNOLOGIES, 2025, 8 (02)
  • [35] Security Analysis of Three-State Continuous Variable Quantum Key Distribution Protocol Based on Discrete Modulation
    Sun Youdong
    Xing Yongxin
    Wang Tianyi
    LASER & OPTOELECTRONICS PROGRESS, 2021, 58 (07)
  • [36] Security of quantum-key-distribution protocol by using the post-selection technique
    Sekga, Comfort
    Mafu, Mhlambululi
    PHYSICS OPEN, 2021, 7
  • [37] How decoherence affects the security of BB84 quantum key distribution protocol
    Okula, Robert
    Mironowicz, Piotr
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [38] Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
    Dong Y.-D.
    Peng J.-Y.
    Zhang X.-B.
    Zhang Z.-L.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 151 - 156
  • [39] A Necessary Condition for the Security of Coherent-One-Way Quantum Key Distribution Protocol
    Mafu, Mhlambululi
    Marais, Adriana
    Petruccione, Francesco
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (06): : 2769 - 2773
  • [40] Effectiveness Of Enhanced Tight Finite Scheme In Quantum Key Distribution Protocol For Network Communication
    Khalid, Roszelinda
    Zukarnain, Zuriati Ahmad
    2014 AUSTRALASIAN TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ATNAC), 2014, : 141 - 145