Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication
Autor: | Alireza Poostindouz, Reihaneh Safavi-Naini, Viliam Lisy |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2018 |
Předmět: |
Key-agreement protocol
021110 strategic defence & security studies Theoretical computer science Markov chain Article Subject Computer Networks and Communications Computer science business.industry 0211 other engineering and technologies Eavesdropping Cryptography 0102 computer and information sciences 02 engineering and technology 01 natural sciences Information-theoretic security 010201 computation theory & mathematics lcsh:Technology (General) lcsh:T1-995 Cryptosystem Communication source lcsh:Science (General) business lcsh:Q1-390 Information Systems Quantum computer |
Zdroj: | Security and Communication Networks, Vol 2018 (2018) |
ISSN: | 1939-0114 |
DOI: | 10.1155/2018/8475818 |
Popis: | Moving target defense (MTD) strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research. |
Databáze: | OpenAIRE |
Externí odkaz: |