QKD Entity Source Authentication: Defense-in-Depth for Post Quantum
Cryptography
- URL: http://arxiv.org/abs/2311.10636v1
- Date: Fri, 17 Nov 2023 16:43:32 GMT
- Title: QKD Entity Source Authentication: Defense-in-Depth for Post Quantum
Cryptography
- Authors: John J. Prisco
- Abstract summary: Quantum key distribution (QKD) was conceived by Charles Bennett and Gilles Brassard in December of 1984.
NIST began a program to standardize a series of quantum resistant algorithms to replace our current encryption standards.
The goal of this paper is to examine the suitability of a hybrid QKD / PQC defense-in-depth strategy.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum key distribution (QKD) was conceived by Charles Bennett and Gilles
Brassard in December of 1984. In the ensuing 39 years QKD systems have been
deployed around the world to provide secure encryption for terrestrial as well
as satellite communication. In 2016 the National Institute of Standards and
Technology (NIST) began a program to standardize a series of quantum resistant
algorithms to replace our current encryption standards thereby protecting
against future quantum computers breaking public key cryptography. This program
is known as post quantum cryptography or PQC. One of the tenets of
cybersecurity is to use an approach that simultaneously provides multiple
protections known as defense-in-depth. This approach seeks to avoid single
points of failure. The goal of this paper is to examine the suitability of a
hybrid QKD / PQC defense-in-depth strategy. A focus of the paper will be to
examine the sufficiency of initial QKD hardware authentication (entity source
authentication) which is necessary to guard against man-in-the-middle attacks.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication [7.318072482453136]
Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography.
This paper proposes a novel method that allows users to communicate while generating the secure keys and securing the transmission without any leakage of the data.
arXiv Detail & Related papers (2024-01-17T05:41:17Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum oblivious transfer: a short review [0.06554326244334865]
We study the concept of oblivious transfer in the area of theoretical quantum cryptography.
We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
arXiv Detail & Related papers (2022-06-06T15:19:26Z) - Authentication of quantum key distribution with post-quantum
cryptography and replay attacks [1.8476815769956565]
Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
arXiv Detail & Related papers (2022-06-02T17:29:34Z) - A Survey on Code-Based Cryptography [0.40964539027092917]
A capable quantum computer can break all currently employed asymmetric cryptosystems.
NIST has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital signature schemes.
In 2023, NIST made an additional call for post-quantum signatures.
arXiv Detail & Related papers (2022-01-18T16:46:42Z) - Experimental Authentication of Quantum Key Distribution with
Post-quantum Cryptography [3.627592297350721]
We experimentally verified the feasibility, efficiency and stability of the PQC algorithm in QKD authentication.
Using PQC authentication we only need to believe the CA is safe, rather than all trusted relays.
arXiv Detail & Related papers (2020-09-10T04:12:07Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.