Wednesday, July 4, 2018

IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY

IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
Mohamed Elboukhari1, Mostafa Azizi2 and Abdelmalek Azizi1,3
1dept. Mathematics & Computer Science, FSO, University Mohamed Ist, Morocco
2 dept. Applied Engineering, ESTO, University Mohamed Ist, Oujda, Morocco
3Academy Hassan II of Sciences & Technology, Rabat, Morocco

ABSTRACT

Quantum Cryptography or Quantum Key Distribution (QKD) solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it was noted that quantum computers could break public key cryptosystems based on number theory. Actually, the progress of research in this field allows the implementation of QKD outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of  QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a novel extension of the TLS protocol based on QKD. We introduce a scheme for integrating Quantum Cryptography in this protocol. Our approach improves the security of the process of authentication and data encryption. Also, we describe an example to illustrate the feasibility of our scheme’s implementation.

KEYWORDS

BB84 Protocol, Cryptography, Quantum Cryptography, Quantum Key Distribution, TLS Protocol 

No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercr...