ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY

Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Hélie

2006

Abstract

Based on extensions to the protocols PPP and IPSEC, we present a working proposal for building a network over which messages can be sent unconditionally secure. We will show how quantum cryptography can be implemented in classical protocols and how existing networks can be efficiently extended to suit our needs for unconditional security. We show that graph connectivity is crucial for the security of the transmission. For that matter, we provide secure routing services, so an adversary cannot penetrate any message flow successfully. Furthermore, our protocols are extensible to allow up to t − 1 adversaries (possibly cooperating) while remaining unconditionally secure.

References

  1. Awerbuch, B., Holmer, D., and Rubens, H. (2003). Provably secure competitive routing against proactive byzantine adversaries via reinforcement learning. Technical Report 2, Department of Computer Science at Johns Hopkins University, Baltimore, MD.
  2. Awerbuch, B., Holmer, D., and Rubens, H. (2004). Swarm intelligence routing resilient to byzantine adversaries.
  3. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. S. (2002). Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev., 36(SI):299-314.
  4. Chartrand, G. (2005). Introduction to graph theory. Higher education. McGraw-Hill, Boston.
  5. Elliott, C. (2002). Building the quantum network. New Journal of Physics, (4 (46.1-46.12)).
  6. Elliott, C., Pearson, D., and Troxel, G. (2003). Quantum cryptography in practice.
  7. Gabow, H. N. (2000). Using expander graphs to find vertex connectivity. In FOCS 7800: Proc. of the 41st Annual Symposium on Foundations of Computer Science, page 410, Washington, DC, USA. IEEE Computer Society.
  8. Ghernaouti-Hélie, S. and Sfaxi, M. A. (2005). Upgrading PPP security by quantum key distribution. In NetCon 2005 conference.
  9. Ghernaouti-Hélie, S., Sfaxi, M. A., Ribordy, G., and Gay, O. (2005). Using quantum key distribution within IPSEC to secure MAN communications. In MAN 2005 conference.
  10. Hu, Y.-C., Perrig, A., and Johnson, D. B. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pages 12-23.
  11. Rass, S. (2005a). How to send messages over quantum networks in an unconditionally secure manner. Technical Report TR-syssec-05-05, University of Klagenfurt, Computer Science, System Security, Klagenfurt.
  12. Rass, S. (2005b). On information-theoretically secure authentication in quantum networks. Technical Report TR-syssec-05-07, University of Klagenfurt, Computer Science, System Security, Klagenfurt.
  13. Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., and Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In ICNP 7802: Proc. of the 10th IEEE International Conference on Network Protocols, pages 78-89, Washington, DC, USA. IEEE Computer Society.
  14. Shamir, A. (1979). How to share a secret. Commun. ACM, 22(11):612-613.
  15. Stinson, D. R. (1992). Universal hashing and authentication codes. In CRYPTO 7891: Proc. of the 11th Annual International Cryptology Conference on Advances in Cryptology, pages 74-85, London, UK. Springer-Verlag.
  16. Webster, A. and Tavares, S. (1986). On the design of Sboxes. In Lecture notes in computer sciences; 218 on Advances in cryptology-CRYPTO 85, pages 523- 534, New York, NY, USA. Springer-Verlag New York, Inc.
Download


Paper Citation


in Harvard Style

Rass S., Ali Sfaxi M. and Ghernaouti-Hélie S. (2006). ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 207-210. DOI: 10.5220/0002094702070210


in Bibtex Style

@conference{secrypt06,
author={Stefan Rass and Mohamed Ali Sfaxi and Solange Ghernaouti-Hélie},
title={ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={207-210},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002094702070210},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY
SN - 978-972-8865-63-4
AU - Rass S.
AU - Ali Sfaxi M.
AU - Ghernaouti-Hélie S.
PY - 2006
SP - 207
EP - 210
DO - 10.5220/0002094702070210