Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol

作者: Aymen Ghilen , Mostafa Azizi , Ridha Bouallegue

DOI: 10.1109/AICCSA.2015.7507129

关键词:

摘要: In a security context, to render cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread technique used within Local Area Networks. To offer greater robustness privacy, we intend through our present paper introduce new quantum extension of that integrates cryptography takes advantage its benefits such as eavesdropping detection, random secret key generation unconditional security. A scheme using previously shared entangled qubits pairs with unitary operators ensure agreement mutual performed. analyze proposed protocol, use PRISM tool model checker. We particularly focus on property minimizing quantity information about enemy can obtain from applying “man in middle” attack. If act parameters channel eavesdropper, prove this affected by varying efficiency well power enemy. More interestingly, show could never able retrieve value key.

参考文章(10)
Chris Peikert, Lattice Cryptography for the Internet International Workshop on Post-Quantum Cryptography. pp. 197- 219 ,(2014) , 10.1007/978-3-319-11659-4_12
Klaus Mattle, Anton Zeilinger, Harald Weinfurter, Jian-Wei Pan, Dik Bouwmeester, Manfred Eibl, Experimental quantum teleportation Nature. ,vol. 390, pp. 575- 579 ,(1997) , 10.1038/37539
Toung-Shang Wei, Chia-Wei Tsai, Tzonelih Hwang, Comment on "Quantum Key Distribution and Quantum Authentication Based on Entangled State" International Journal of Theoretical Physics. ,vol. 50, pp. 2703- 2707 ,(2011) , 10.1007/S10773-011-0768-0
Charles H. Bennett, Gilles Brassard, Quantum cryptography Theoretical Computer Science. ,vol. 560, pp. 7- 11 ,(2014) , 10.1016/J.TCS.2014.05.025
Gethin Norman, David Parker, Jeremy Sproston, Model checking for probabilistic timed automata formal methods. ,vol. 43, pp. 164- 190 ,(2013) , 10.1007/S10703-012-0177-X
B. Aboba, D. Simon, PPP EAP TLS Authentication Protocol Internet RFC-2716. ,vol. 2716, pp. 1- 24 ,(1999)
Taher ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms international cryptology conference. ,vol. 31, pp. 10- 18 ,(1985) , 10.1109/TIT.1985.1057074
Mario Pivk, Christian Kollmitzer, Stefan Rass, SSL/TLS with Quantum Cryptography 2009 Third International Conference on Quantum, Nano and Micro Technologies. pp. 96- 101 ,(2009) , 10.1109/ICQNM.2009.29
Aymen Ghilen, Hafedh Belmabrouk, Mostafa Azizi, Incorporation and Model Checking of a Quantum Authentication and Key Distribution Scheme in EAP-TLS Springer, Cham. pp. 457- 467 ,(2016) , 10.1007/978-3-319-30298-0_47
Aymen Ghilen, Hafedh Belmabrouk, Ridha Bouallegue, Classification of quantum authentication protocols and calculation of their complexity international conference on sciences and techniques of automatic control and computer engineering. pp. 169- 173 ,(2014) , 10.1109/STA.2014.7086669