Quantum Authentication Protocols for GSM

12/05/2018
by   Behzad Lari, et al.
0

Security deficiencies and bugs in the Authentication of SIM cards in Global Systems for Mobile (GSM) have led us to present new protocols for these networks using the principles of quantum cryptography. In this paper first, we provide a protocol for detecting and removing SIM card that has a copy, using three entangle particles source and quantum channel when the original SIM card and its copy simultaneously logging in the mobile network. Then, another protocol based on the use of quantum memory (which is embedded in the SIM card) is presented. Both of these protocols can use to authenticate and remove SIM card that has a copy.

READ FULL TEXT

page 10

page 11

page 14

page 15

research
12/08/2021

A short review on quantum identity authentication protocols: How would Bob know that he is talking with Alice?

Secure communication has achieved a new dimension with the advent of the...
research
04/08/2019

Symbolic Abstractions for Quantum Protocol Verification

This technical report explores the use of symbolic model and verifiers t...
research
03/22/2021

Systematic benchmarking of HTTPS third party copy on 100Gbps links using XRootD

The High Luminosity Large Hadron Collider provides a data challenge. The...
research
04/04/2017

Using Echo State Networks for Cryptography

Echo state networks are simple recurrent neural networks that are easy t...
research
08/01/2021

Remote quantum-safe authentication of entities with physical unclonable functions

Physical unclonable functions have been shown a useful resource of rando...
research
05/19/2022

Quantum Money Generated by Multiple Untrustworthy Banks

While classical money can be copied, it is impossible to copy quantum mo...
research
10/24/2022

The Case for Accelerating BFT Protocols Using In-Network Ordering

Mission critical systems deployed in data centers today are facing more ...

Please sign up or login with your details

Forgot password? Click here to reset