2018
DOI: 10.1155/2018/8475818
|View full text |Cite
|
Sign up to set email alerts
|

Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication

Abstract: Moving target defense (MTD) strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…To further improve security and efficiency of the system against a dynamic adversary that changes the set of their eavesdropped paths over time, a Moving Target Defence (MTD) approach to SMT systems was proposed [17].…”
Section: Moving Target Defence (Mtd)mentioning
confidence: 99%
See 1 more Smart Citation
“…To further improve security and efficiency of the system against a dynamic adversary that changes the set of their eavesdropped paths over time, a Moving Target Defence (MTD) approach to SMT systems was proposed [17].…”
Section: Moving Target Defence (Mtd)mentioning
confidence: 99%
“…The system is proved to provide post-quantum security without relying on a secret key or intractability assumption. The system was published in [17] and used an evaluation framework for the MTD strategy that was proposed in [1,9]. We motivate the need for implementation and experiments to (i) understand the cost of employing the system in practice to refine the model and make the results closer to a real-life implementation, and (ii) to validate the assumptions and evaluate performance of the system in practice.…”
Section: Introductionmentioning
confidence: 99%
“…By now, the researchers have put more emphasis on changing static parameters of the data flow on the fly [16,17,18,19,20]. The IP address [21], the port [22], and the routing path of a flow [11,19,20,23,24,25] are the main objects of dynamic configuration.…”
Section: Related Workmentioning
confidence: 99%
“…Dolev and Tzur-David [13] propose a secret sharing scheme over multiple network paths to mitigate the problem of stolen or short keys (i.e., implementation vulnerabilities). Ahmadi et al [1] and later Safavi-Naini et al [30] considered models where shares of the message are sent over multiple paths that are changing (switching) in each time interval, and proved that the system provides information theoretic security and so stays secure against a quantum computer. Applications on real networks for such schemes, which combine secret sharing with multi-path switching, have also started to be proposed, including [10], which applies secret sharing to provide security for controller and switch communication in the face of an adversary with quantum computing capabilities in Software-Defined Networks (SDNs).…”
Section: Introductionmentioning
confidence: 99%
“…In this work, our goal is to examine the real-world security of schemes that combine secret sharing with multipath switching. We consider the scheme in [30] (referred to in the rest of this paper as Multi-path Switching with Secret Sharing or, for short, MSSS) because it was shown to have perfect information theoretic security. The security of MSSS relies on the assumptions that paths are atomic and packets travel on such paths with the same delay.…”
Section: Introductionmentioning
confidence: 99%