Credentials Protection Using QKD Scheme and the Input Data for Login Applications

Autor: Sumathi, R., Raajan, N. R., Amirtharajan, R.
Zdroj: Journal of the Institution of Engineers (India): Series B; 20240101, Issue: Preprints p1-5, 5p
Abstrakt: The heavy usage of IoT applications demands the security of the credentials used to access the same. Connecting devices using the Internet has made it possible to execute applications that were once assumed to be practically impossible. IoT-based applications in child monitoring, health monitoring (Shahid in Appl. Sci., 12:1927, 2022), the retail industry, the fitness industry, the agriculture industry, and so on have come as a boon. It allows the legitimate user (Jung in Comput. Secur., 108:102338, 2021; Poh in IEEE Trans. Dependable Secure Comput. Comput., 18:1095–1107, 2019) to log into his account, monitor things effectively, and permit to take actions appropriately (as reported by Swati (in: Artificial intelligence and sustainable computing: proceedings of ICSISCET 2020, Springer Singapore, Singapore, 2021); as reported by Souror (in: International conference on electronic engineering (ICEEM), 2021); as reported by Das (in: Advances in cyber security: second international conference, 2021)). It is essential to keep these credentials secured from the reach of malicious users (Kumar in Alex. Eng. J., 61:6001–6022, 2022; as reported by Krishna Kagita (in: A Review on Security and Privacy of Internet of Medical Things, 2020)). This paper suggests an uncomplicated, single-rounded, highly random scheme, nevertheless, successfully encrypts the password using a hybrid key selected from a pool of keys using a random number generator. The number of keys in the pool is equal to the average of the lengths of the keys generated using the QKD (Quantum key distribution) technique and the length of the input data (password). The security offered to the data is strengthened by first encoding the credentials using a look-up table where the assigned symbols for every single character could be changed at regular intervals, enabling the scheme to withstand different types of attacks including the brute-force attack as the key space is greater than 2128.
Databáze: Supplemental Index