Enhancing the Security of IEEE 802.11i Standard by Integrating a Quantum Scheme for Authentication and Encryption Key Distribution
Autor: | Ridha Bouallegue, Mostafa Azizi, Aymen Ghilen |
---|---|
Rok vydání: | 2016 |
Předmět: |
Key establishment
Computer science Key distribution Cryptography 02 engineering and technology Quantum entanglement Quantum key distribution Man-in-the-middle attack Computer security computer.software_genre 01 natural sciences Security association 0103 physical sciences 0202 electrical engineering electronic engineering information engineering Static key Key encapsulation Pre-shared key Electrical and Electronic Engineering 010306 general physics Quantum Key exchange Computer Science::Cryptography and Security Key size Group key Authentication business.industry Mutual authentication Adversary Computer Science Applications Quantum cryptography Key (cryptography) 020201 artificial intelligence & image processing Quantum algorithm Cryptographic key types business computer Computer network |
Zdroj: | Wireless Personal Communications. 95:1655-1675 |
ISSN: | 1572-834X 0929-6212 |
DOI: | 10.1007/s11277-016-3873-9 |
Popis: | According to the principles of quantum mechanics, quantum cryptography provides the necessary means to establish a secret and perfectly random key material between two parties. However, classical cryptography suffers from several vulnerabilities that make it unsecure against impersonation attacks or enemy with an unbounded computing power. Improving the contemporary cryptographic methods, based only on computational security, by integrating a quantum cryptographic solution becomes an interesting prospect worth exploring. In this paper, we introduce a quantum scheme, for mutual authentication and key establishment, which will be integrated within IEEE 802.11 networks to reach absolute security. The key issued from the quantum algorithm is a fundamental parameter for authenticating the participating parties and for building the Pairwise key and the Group key hierarchies. To inspect the security of our approach, a formal verification of some security properties is performed using the Model Checking technique. |
Databáze: | OpenAIRE |
Externí odkaz: |