Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)

Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing ke...

Full description

Saved in:
Bibliographic Details
Main Authors: Majeed, Mohammed Munther A, Al-Khateeb, Khalid A. Saeed, Wahiddin, Mohamed Ridza, Saeb, Magdy M.
Format: Article
Language:English
Published: Science Publications 2010
Subjects:
Online Access:http://irep.iium.edu.my/5437/1/jcs6101123-1129.pdf
http://irep.iium.edu.my/5437/
http://thescipub.com/html/10.3844/jcssp.2010.1123.1129
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.5437
record_format dspace
spelling my.iium.irep.54372020-06-23T08:41:15Z http://irep.iium.edu.my/5437/ Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP) Majeed, Mohammed Munther A Al-Khateeb, Khalid A. Saeed Wahiddin, Mohamed Ridza Saeb, Magdy M. TK5101 Telecommunication. Including telegraphy, radio, radar, television TK7885 Computer engineering Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing key according to previous points. Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. The concepts presented by this protocol represent a valid approach to the communication security problem. Science Publications 2010 Article PeerReviewed application/pdf en http://irep.iium.edu.my/5437/1/jcs6101123-1129.pdf Majeed, Mohammed Munther A and Al-Khateeb, Khalid A. Saeed and Wahiddin, Mohamed Ridza and Saeb, Magdy M. (2010) Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP). Journal of Computer Science, 6 (10). pp. 1123-1129. ISSN 1549-3636 http://thescipub.com/html/10.3844/jcssp.2010.1123.1129 DOI: 10.3844/jcssp.2010.1123.1129
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK5101 Telecommunication. Including telegraphy, radio, radar, television
TK7885 Computer engineering
spellingShingle TK5101 Telecommunication. Including telegraphy, radio, radar, television
TK7885 Computer engineering
Majeed, Mohammed Munther A
Al-Khateeb, Khalid A. Saeed
Wahiddin, Mohamed Ridza
Saeb, Magdy M.
Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
description Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing key according to previous points. Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. Results: The proposed quantum authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. The concepts presented by this protocol represent a valid approach to the communication security problem.
format Article
author Majeed, Mohammed Munther A
Al-Khateeb, Khalid A. Saeed
Wahiddin, Mohamed Ridza
Saeb, Magdy M.
author_facet Majeed, Mohammed Munther A
Al-Khateeb, Khalid A. Saeed
Wahiddin, Mohamed Ridza
Saeb, Magdy M.
author_sort Majeed, Mohammed Munther A
title Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
title_short Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
title_full Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
title_fullStr Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
title_full_unstemmed Protocol of secure key distribution using Hash Functions and Quantum Authenticated channels (KDP-6DP)
title_sort protocol of secure key distribution using hash functions and quantum authenticated channels (kdp-6dp)
publisher Science Publications
publishDate 2010
url http://irep.iium.edu.my/5437/1/jcs6101123-1129.pdf
http://irep.iium.edu.my/5437/
http://thescipub.com/html/10.3844/jcssp.2010.1123.1129
_version_ 1672610058089791488
score 13.211869