Al-Khateeb, Khalid A. Saeed and A. Majeed, Mohammed Munther and M. Saeb, Magdy and Wahiddin, Mohamed Ridza (2010) A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP). In: International Conference on Computer and Communication Engineering, ICCCE 2010, 11-13 May 2010, Kuala Lumpur, Malaysia.
| ![[img]](http://irep.iium.edu.my/style/images/fileicons/application_pdf.png) | PDF (A secure protocol using 6DP for Quantum Authentication and Hash Functions for Key Distribution (KDP-6DP))
 - Published Version Restricted to Registered users only Download (395kB) | Request a copy | 
Abstract
Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP.
Actions (login required)
|  | View Item | 
 
	
	 Download Statistics
 Download Statistics Download Statistics
 Download Statistics