A Study on the One-to-Many Authentication Scheme for Cryptosystem Based on Quantum Key Distribution

Modern cryptosystem uses authentication mechanisms for secure communication and authentication mechanism is essential even at cryptosystems based on QKD (Quantum Key Distribution). However, since any practical authentication mechanisms dedicated to quantum cryptosystem are not available yet, we propose an authentication scheme for cryptosystem based on QKD through comparing the authentication mechanisms have been studied in this paper. Our authentication scheme is designed using FIPS compliant algorithms and complies with FIPS requirements. Key materials generated by QKD help the cryptosystem enhance its security. In addition, we select security parameters so that our scheme can be implemented efficiently for one- to-many communication model.

[1]  Lidong Chen,et al.  Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .

[2]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .

[3]  Morris J. Dworkin SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .

[4]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[5]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[6]  Ju-Sung Kang,et al.  Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem , 2016 .

[7]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[8]  Hugo Krawczyk,et al.  HMAC-based Extract-and-Expand Key Derivation Function (HKDF) , 2010, RFC.

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Stefan Rass,et al.  BB84 Quantum Key Distribution with Intrinsic Authentication , 2015 .

[11]  Miles E. Smid,et al.  Security Requirements for Cryptographic Modules | NIST , 1994 .

[12]  D. R. Kuhn A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography , 2003, quant-ph/0301150.

[13]  Gilles van Assche Quantum Cryptography and Secret-Key Distillation: Cryptosystems based on quantum key distribution , 2006 .

[14]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[15]  Quynh H. Dang,et al.  Recommendation for Applications Using Approved Hash Algorithms , 2009 .