Open Access
Subscription or Fee Access
Message Authentication Privacy Using Quantum Key Distribution
Abstract
Sensor networks are the key to gathering the information needed by smart environments, However, the highly constrained nature of sensors imposes a difficult challenge: their reduced availability of memory, processing power and energy hinders the deployment of many modern cryptographic algorithms considered secure, a number of extensive analyses comparing different encryption algorithms and key management schemes have been developed, while very little attention has been given to message authentication solutions. The purpose is to assess the options for protecting the integrity of messages in sensor networks and have a solution that protects against all kinds of attacks. A polynomial - based scheme was introduced to provide pair-wise connectivity, high scalability and also observed to be resilient against both traffic analysis and node capture attacks. In this paper, we propose a scalable message authentication scheme based on quantum cryptography which exchange a key securely by means of quantum key distribution and allows the breaking of various popular public-key encryption and signature schemes (e.g., RSA and ElGamal).
Keywords
Wireless Sensor Network, Message Authentication, Signature Schemes, QC, Attacks
Full Text:
PDFReferences
C.H.Bennett, “QUANTUM CRYPTOGRAPHY: uncertainty in the service os privacy”, vol.257, 7 august 1992, pp.752-753”.
Chaung, Isaac and Nielsen, Michael A... quantum computation and quantum information Cambridge: university press, 2000.
Rivest R.shamirA. and Adelman L., “on digital signatures and public-key cryptosystems”, “MIT lab for cse, technical report.
[EPTO3] Chip Elloit,David Pearson, Gregory Trowel; quantum cryptography in practice;
S.K.Moore, IEEE spectrum, may 2002.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.