A new quantum authentication and key distribution protocol /

Key distribution is a fundamental problem in cryptography, in both symmetric and asymmetric ciphers. Symmetric ciphers usually resort to a courier-based method for key exchange, as do quantum key distribution systems. On the other hand, a schema for using hash functions as a medium for key exchange...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Abdul Majeed, Mohammed Munther
التنسيق: أطروحة
اللغة:English
منشور في: Kuala Lumpur : Kulliyyah of Engineering, International Islamic University Malaysia, 2012
الموضوعات:
الوصول للمادة أونلاين:Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library.
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:Key distribution is a fundamental problem in cryptography, in both symmetric and asymmetric ciphers. Symmetric ciphers usually resort to a courier-based method for key exchange, as do quantum key distribution systems. On the other hand, a schema for using hash functions as a medium for key exchange in both symmetric and asymmetric cipher was proposed by several investigators. However, if the schema is to be successful, the channel utilized should be substantially authenticated. Furthermore, and quite recently, the advancement in quantum-based communications has provided better means for authentication, which is utilized in this work. This thesis builds a novel key distribution protocol, based on cascaded hash functions, utilizing a communication channel that is authenticated based on the quantum-authentication by a deterministic six-state protocol (6DP). The basic idea is to divide this key distribution protocol into two processes; the control process where the 6DP is utilized to authenticate the channel, and the second process where cascaded hash functions, based on key distribution techniques, are used to construct the key at the sender and receiver sites. The hardware built for quantum authentication process is a field programmable gate array (FPGA) at the sender site, to control the setting of the quantum states through a random generator built into the FPGA. In addition, the FPGA is used to synchronize the laser timing pulses and opening/closing of the detectors gates to prevent eavesdroppers from compromising the security, hence authentication is established.
وصف المادة:Abstracts in English and Arabic.
"A thesis submitted in fulfilment of the requirement for the Doctor of Philosophy in Electrical and Computer Engineering."--On t.p.
وصف مادي:xx, 208 leaves : ill. ; 30cm.
بيبلوغرافيا:Includes bibliographical references (leaves 158-164).