Authentication in virtual private networks based on quantum key distribution methods

被引:3
作者
Niemiec, Marcin [1 ]
Machnik, Petr [2 ]
机构
[1] AGH Univ Sci & Technol, Mickiewicza 30 Ave, PL-30059 Krakow, Poland
[2] VSB Tech Univ Ostrava, 17 Listopadu 15, Ostrava 70833, Czech Republic
关键词
Security; Authentication; Quantum key distribution; Virtual private networks; IPsec protocol; AMPLIFICATION;
D O I
10.1007/s11042-014-2299-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum physics has a major influence on modern computer science and communications. New quantum-based solutions continue to be proposed by researchers. However, only a few techniques are possible to implement in practice. One of them is quantum key distribution, which ensures the confidentiality of digital data. This article introduces a new concept: quantum distribution of pre-shared keys. This approach provides end-users with very secure authentication, impossible to achieve using currently-available techniques. Secure authentication is a key requirement in virtual private networks (VPN)-popular protection in computer networks. The authors simulated quantum-based distribution of a shared secret in a typical VPN connection. Using a dedicated simulator, all individual steps of the quantum key distribution process were presented. Based on the created secret, a secure IPsec tunnel in a StrongSwan environment was established between AGH (Poland) and VSB (Czech Republic). It allows end-users to communicate at very high security levels.
引用
收藏
页码:10691 / 10707
页数:17
相关论文
共 21 条
  • [1] [Anonymous], 1999, 2631 RFC
  • [2] [Anonymous], C P INT S COMM INF T
  • [3] [Anonymous], SECRET KEY RECONCILI
  • [4] [Anonymous], 2010, RANDOM NUMBER GENERA
  • [5] [Anonymous], 1991, RECOMMENDATION X 800
  • [6] Assche G. V., 2006, QUANTUM CRYPTOGRAPHY
  • [7] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
  • [8] Bennett C H, 1984, IEEE INT C COMP SYST, V175, P175
  • [9] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [10] PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION
    BENNETT, CH
    BRASSARD, G
    ROBERT, JM
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 210 - 229