Authentication of quantum key distribution with post-quantum cryptography and replay attacks

06/02/2022
by   Liu-Jun Wang, et al.
0

With the development of quantum computers, traditional cryptographic systems are facing more and more serious security threats. Fortunately, quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security, and both will become important solutions for future information security. However, neither of them is perfect, and they are complementary. Quantum key distribution has unconditional security that post-quantum cryptography does not have, and PQC can provide secure and convenient authentication for QKD networks. In this paper, we propose two protocols based on PQC to realize the full authentication of the QKD data post-processing, and we only need to assume the short-term security of PQC algorithm to ensure the long-term quantum resistant security of distributed keys. We found that for the above two authentication protocols, attackers cannot successfully implement replay attacks. These authentication protocols can solve the problems of the current pre-shared key authentication in the application of large-scale quantum key distribution networks, and are expected to realize a key distribution mechanism with practical operability and quantum resistant security, which will be beneficial to promote the deployment and application of quantum key distribution networks.

READ FULL TEXT

page 1

page 2

page 4

page 5

page 6

research
12/01/2021

Quantum-Resistant Cryptography

Quantum-resistant cryptography is cryptography that aims to deliver cryp...
research
02/15/2023

Quantum key distribution with post-processing driven by physical unclonable functions

Quantum key-distribution protocols allow two honest distant parties to e...
research
11/02/2019

A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

Millions of devices are going to participate in 5G producing a huge spac...
research
11/27/2017

The Status of Quantum-Based Long-Term Secure Communication over the Internet

Sensitive digital data, such as health information or governmental archi...
research
01/10/2020

QSOR: Quantum-Safe Onion Routing

In this work, we propose a study on the use of post-quantum cryptographi...
research
02/09/2022

Security of EV-Charging Protocols

The field of electric vehicle charging involves a complex combination of...
research
11/11/2019

A New Approach: Cognitive Multi-Level Authentication (CMLA) in Nuclear Command and Control

Nuclear monitoring must considered as high precedence against national s...

Please sign up or login with your details

Forgot password? Click here to reset