802.11i Encryption Key Distribution Using Quantum Cryptography

Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propose a scheme integrating quantum cryptography in 802.11i security mechanisms for the distribution of the encryption keys. The use of an apparatus network to provide alternative line-of-sight paths is also discussed.

[1]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[2]  Richard J. Hughes,et al.  FREE-SPACE QUANTUM-KEY DISTRIBUTION , 1998, quant-ph/9801006.

[3]  S. Inoue,et al.  Quantum key distribution over an installed multimode optical fiber local area network , 2006, 2006 Conference on Lasers and Electro-Optics and 2006 Quantum Electronics and Laser Science Conference.

[4]  Richard J. Hughes,et al.  Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.

[5]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[6]  H. Weinfurter,et al.  Distributing entanglement and single photons through an intra-city, free-space quantum channel , 2005, EQEC '05. European Quantum Electronics Conference, 2005..

[7]  Solange Ghernaouti-Helie,et al.  Integration of quantum cryptography in 802.11 networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[8]  Dan Simon,et al.  PPP EAP TLS Authentication Protocol , 1999, RFC.

[9]  A. Tomita,et al.  Single-photon interference experiment over 100 km for quantum cryptography system using balanced gated-mode photon detector , 2003, quant-ph/0306066.

[10]  D. Bethune,et al.  Autocompensating quantum cryptography , 2002, quant-ph/0204144.

[11]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[12]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[13]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[14]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[15]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[16]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[17]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[18]  Lars Richter,et al.  Untersuchung und Bewertung von Netzzugangssteuerungen auf Basis des Standards 802.1x (Port-Based Network Access Control) , 2005 .

[19]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[20]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[21]  Jane E. Nordholt,et al.  Free space quantum key distribution over 10km in daylight and at night , 2002 .

[22]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[23]  Kenneth G. Paterson,et al.  Why Quantum Cryptography , 2004 .

[24]  Bernard Aboba,et al.  Extensible Authentication Protocol (EAP) , 2004, RFC.

[25]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[26]  Harald Weinfurter,et al.  Long-distance free-space quantum cryptography , 2002, SPIE/COS Photonics Asia.

[27]  A. Zeilinger,et al.  Long-distance quantum communication with entangled photons using satellites , 2003, quant-ph/0305105.

[28]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[29]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[30]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[31]  N. Gisin,et al.  Quantum cryptography , 1998 .

[32]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[33]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.