Abstract

Security is the most tedious problem in highly sensitive communications. Quantum security is the key issue in solving the problem. A key distribution protocol based on the use of hash functions is proposed. The essential part of the protocol depends on sending a string of random characters from sender to receiver. Then, a selected hash or a cascade of two hash functions and a long-term shared secret are used to construct the key. Consequently, the session key is generated on-site by independently applying a hash function on the random string at the sender and receiver sides. However, this protocol requires a reliable method of authentication. Therefore, it is further proposed to use an out-of-band authentication methodology based on the deterministic six-state quantum protocol that is referred to as 6DP.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.