IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Quantum Secure Entity Authentication Protocol Design for Network Security

A Quantum Secure Entity Authentication Protocol Design for Network Security
View Sample PDF
Author(s): Surjit Paul (IIT Kharagpur, Kharagpur, India), Sanjay Kumar (NIT Jamshedpur, Jamshedpur, India)and Rajiv Ranjan Suman (NIT Jamshedpur, Jamshedpur, India)
Copyright: 2021
Pages: 13
Source title: Research Anthology on Advancements in Quantum Technology
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-8593-1.ch012

Purchase

View A Quantum Secure Entity Authentication Protocol Design for Network Security on the publisher's website for pricing and purchasing information.

Abstract

Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.

Related Content

M. Suchetha, Jaya Sai Kotamsetti, Dasapalli Sasidhar Reddy, S. Preethi, D. Edwin Dhas. © 2024. 14 pages.
A. Bhuvaneswari, R. Srivel, N. Elamathi, S. Shitharth, K. Sangeetha. © 2024. 15 pages.
Srinivas Kumar Palvadi. © 2024. 28 pages.
Srinivas Kumar Palvadi. © 2024. 20 pages.
Nitika Kapoor, Parminder Singh, Kusrini M. Kom, Vishal Bharti. © 2024. 19 pages.
M. Suchetha, V. V. Rama Raghavan, Shaik Fardeen, P. V. S. Nithish, S. Preethi, D. Edwin Dhas. © 2024. 13 pages.
Damandeep Kaur, Shamandeep Singh, Simarjeet Kaur, Gurpreet Singh, Rani Kumari. © 2024. 17 pages.
Body Bottom