Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol

被引:0
|
作者
Ghilen, Aymen [1 ]
Azizi, Mostafa [2 ]
Bouallegue, Ridha [3 ]
机构
[1] Natl Engn Sch Tunis, Tunis, Tunisia
[2] Univ Mohammed Ist Oujda, ESTO, Lab MATSI, Dept Comp Engn, Oujda, Morocco
[3] Higher Sch Commun, Innovcom Lab, Aryanah, Tunisia
来源
2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2015年
关键词
Quantum Authentication; Quantum Key Distribution; Entanglement; Bell States; CHAP; PRISM; Model Checking;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we intend through our present paper to introduce a new quantum extension of CHAP that integrates quantum cryptography and takes advantage of its benefits such as eavesdropping detection, random secret key generation and unconditional security. A new scheme using a previously shared entangled qubits pairs with quantum unitary operators to ensure key agreement and mutual authentication is performed. To analyze the security of the proposed protocol, we use the PRISM tool as a model checker. We particularly focus on the security property of minimizing the quantity of information about the key that an enemy can obtain from applying a "man in the middle" attack. If we act on the parameters of the channel and the eavesdropper, we prove that this security property is affected by varying the efficiency of the channel as well as the power of the enemy. More interestingly, we show that the enemy could never be able to retrieve the value of the key.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Finite-key security analysis of quantum key distribution with imperfect light sources
    Mizutani, Akihiro
    Curty, Marcos
    Lim, Charles Ci Wen
    Imoto, Nobuyuki
    Tamaki, Kiyoshi
    NEW JOURNAL OF PHYSICS, 2015, 17
  • [42] SECURITY PROOF OF QUANTUM KEY DISTRIBUTION WITH DETECTION EFFICIENCY MISMATCH
    Fung, Chi-Hang Fred
    Tamaki, Kryoshi
    Qi, Bing
    Lo, Hoi-Kwong
    Ma, Xiongfeng
    QUANTUM INFORMATION & COMPUTATION, 2009, 9 (1-2) : 131 - 165
  • [43] SECURITY ANALYSIS OF THE TIME-CODING QUANTUM KEY DISTRIBUTION PROTOCOLS
    Debuisschert, Thierry
    Fossier, Simon
    QUANTUM INFORMATION & COMPUTATION, 2011, 11 (11-12) : 968 - 987
  • [44] ANALYSIS OF RECONCILIATION PROTOCOL IN QUANTUM KEY DISTRIBUTION USING COHERENT STATES
    Du, Le
    Yu, Li
    Yang, Bojun
    CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 296 - +
  • [45] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):
  • [46] Security of quantum key distribution with imperfect devices
    Gottesman, D
    Lo, HK
    Lütkenhaus, N
    Preskill, J
    QUANTUM INFORMATION & COMPUTATION, 2004, 4 (05) : 325 - 360
  • [47] New Probabilistic Quantum Key Distribution Protocol
    Chun-Wei Yang
    International Journal of Theoretical Physics, 2018, 57 : 3651 - 3657
  • [48] A new efficient quantum key distribution protocol
    Yang, CN
    Kuo, CC
    QUANTUM OPTICS IN COMPUTING AND COMMUNICATIONS, 2002, 4917 : 54 - 58
  • [49] Failure of Kak quantum key distribution protocol
    Ching-Nung Yang
    Su-Hsuan Chu
    Bing-Ling Lu
    Pramana, 2005, 64 : 1 - 4
  • [50] Experimental quantum key distribution with double protocol
    Hu Hua-Peng
    Zhang Jing
    Wang Jin-Dong
    Huang Yu-Xian
    Lu Yi-Qun
    Liu Song-Hao
    Lu Wei
    ACTA PHYSICA SINICA, 2008, 57 (09) : 5605 - 5611