2010
DOI: 10.5121/ijnsa.2010.2306
|View full text |Cite
|
Sign up to set email alerts
|

Improving TLS Security By Quantum Cryptography

Abstract: implemented technologies. Some research is in progress for the integration of QKD with the protocols in different layers of OSI model. The examples of such research effort are the integration of QKD in point-to-point protocol (PPP) OSI layer 2 and the integration of QKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technology for enhancing the security of modern computing applications on the internet. In this paper, we present a novel extension of the TLS protocol based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…The work of Elboukhari et al [21] presents a new approach to combining a quantum key distribution protocol with classical security protocols, and defines how they integrate QKD into the TLS protocol. Using the BB84 protocol, they have defined an extended TLS protocol that enhances the security of the TLS protocol as described in RFC5246.…”
Section: Related Workmentioning
confidence: 99%
“…The work of Elboukhari et al [21] presents a new approach to combining a quantum key distribution protocol with classical security protocols, and defines how they integrate QKD into the TLS protocol. Using the BB84 protocol, they have defined an extended TLS protocol that enhances the security of the TLS protocol as described in RFC5246.…”
Section: Related Workmentioning
confidence: 99%
“…The protocols periodically request fresh keying material and fall back to conventional key exchange if QKD is not operational. Another option for TLS integration is suggested in [4], where the handshake protocol is modified so that QKD is carried out in the middle of the handshake, and a configuration protocol is added to agree on parameters such as the key length. Our own proposal relies upon a pre-established QKD channel such that QKD-generated key material is continuously made available for each party, and takes advantage of the existing pre-shared secret key standards to avoid significant re-work in the protocols; the transmitted fields relating to the pre-shared secret are appropriately modified so that both parties obtain the same quantum-generated key, and significant re-work to the protocols are avoided.…”
Section: Related Workmentioning
confidence: 99%
“…Industrially, lead is a useful metal due to its low melting point, resistance to corrosion, and high malleability and ductility [1][2][3]. Workplace lead exposure may result in a rise of lead dust that is a risk for lead poisoning [1].…”
Section: Introductionmentioning
confidence: 99%