Research Article Open Access

Protocol of Secure Key Distribution Using Hash Functions and Quantum Authenticated Channels (KDP-6DP)

Mohammed Munther A. Majeed, Khalid A.S. Al-Khateeb, Mohamed R. Wahiddin and Magdy M. Saeb

Abstract

Problem statement: In previous researches, we investigated the security of communication channels, which utilizes authentication, key distribution between two parties, error corrections and cost establishment. In the present work, we studied new concepts of Quantum Authentication (QA) and sharing key according to previous points. Approach: This study presented a new protocol concept that allows the session and key generation on-site by independently applying a cascade of two hash functions on a random string of bits at the sender and receiver sides. This protocol however, required a reliable method of authentication. It employed an out-of-band authentication methodology based on quantum theory, which uses entangled pairs of photons. Results: The proposed quantum-authenticated channel is secure in the presence of eavesdropper who has access to both the classical and the quantum channels. Conclusion/Recommendations: The key distribution process using cascaded hash functions provides better security. The concepts presented by this protocol represent a valid approach to the communication security problem.

Journal of Computer Science
Volume 6 No. 10, 2010, 1123-1129

DOI: https://doi.org/10.3844/jcssp.2010.1123.1129

Submitted On: 21 June 2010 Published On: 24 August 2010

How to Cite: Majeed, M. M. A., Al-Khateeb, K. A., Wahiddin, M. R. & Saeb, M. M. (2010). Protocol of Secure Key Distribution Using Hash Functions and Quantum Authenticated Channels (KDP-6DP). Journal of Computer Science, 6(10), 1123-1129. https://doi.org/10.3844/jcssp.2010.1123.1129

  • 3,443 Views
  • 2,778 Downloads
  • 0 Citations

Download

Keywords

  • Quantum Authentication Process (QAP)
  • Virtual Private Network (VPN)
  • Key Distribution Process (KDP)