Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

[1]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[2]  Daruri Venugopal,et al.  Network Security and Cryptography , 2015 .

[3]  Mosa Ali Abu-Rgheff Fundamentals of Spread-Spectrum Techniques , 2007 .

[4]  Tzonelih Hwang,et al.  Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols , 2007, IEEE Transactions on Dependable and Secure Computing.

[5]  Dharmendra Sharma,et al.  Agent-Oriented Novel Quantum Key Distribution Protocol for the Security in Wireless Network , 2009 .

[6]  John T. Kohl,et al.  The Evolution of the Kerberos Authentication Service , 1992 .

[7]  Li-Hua Gong,et al.  Quantum deterministic key distribution protocols based on teleportation and entanglement swapping , 2011 .

[8]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[9]  Li Gong,et al.  Efficient network authentication protocols: Lower bounds and optimal implementations , 1995, Distributed Computing.

[10]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[11]  Solange Ghernaouti-Helie,et al.  Integration of quantum cryptography in 802.11 networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[12]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[13]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[14]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[15]  Guihua Zeng,et al.  Identity verification in quantum key distribution , 2000 .

[16]  Vijey Thayananthan Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks , 2011 .

[17]  Tzonelih Hwang,et al.  Provably secure three-party password-based authenticated key exchange protocol using Weil pairing , 2005 .

[18]  Alan Mink,et al.  Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration , 2010, ArXiv.

[19]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[20]  G. L. Morgan,et al.  Quantum Cryptography over Underground Optical Fibers , 1996, CRYPTO.

[21]  Li-Hua Gong,et al.  Quantum deterministic key distribution protocols based on the authenticated entanglement channel , 2010 .

[22]  Jürgen Schönwälder,et al.  A nonce-based protocol for multiple authentications , 1992, OPSR.

[23]  Won Young Hwang,et al.  Quantum cryptography without public announcement of bases , 1997 .

[24]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .

[25]  Dongho Won,et al.  Simple and Efficient Group Key Agreement Based on Factoring , 2004, ICCSA.

[26]  Li-Hua Gong,et al.  A continuous variable quantum deterministic key distribution based on two-mode squeezed states , 2014 .

[27]  Fibirova Jana,et al.  Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .

[28]  Li-Hua Gong,et al.  Novel Quantum Deterministic Key Distribution Protocols with Entangled States , 2010 .

[29]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[30]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.