Quantum key distribution protocols in transmission control protocol
A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed...
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf |
_version_ | 1825947803598192640 |
---|---|
author | Kamarul Aizan, Nur Hanani |
author_facet | Kamarul Aizan, Nur Hanani |
author_sort | Kamarul Aizan, Nur Hanani |
collection | UPM |
description | A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed by the laws of physics. This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. The parameters used for this research are with attack and without attack, where measured by three measurements for both protocols which are final key length, expected key length by eavesdropper and error rate estimation. The 802.11i WLAN is consider as insecure because the tendency to be intercepted by intruders is high. Furthermore, the interference from other consumer devices such as cordless phone and microwave can contribute to degradation of WLAN performance. This type of noise can generate different numbers of final key length and different levels of error rate estimation. Thus, the level of the error rate estimation determined the secrecy of the secret key. The discussion of security issue between BB84 and B92 protocols also discussed in terms of secrecy and strength of the secret key between both protocols in 802.11i WLAN. |
first_indexed | 2024-03-06T08:19:04Z |
format | Thesis |
id | upm.eprints-30926 |
institution | Universiti Putra Malaysia |
language | English |
last_indexed | 2024-03-06T08:19:04Z |
publishDate | 2012 |
record_format | dspace |
spelling | upm.eprints-309262015-02-06T00:54:53Z http://psasir.upm.edu.my/id/eprint/30926/ Quantum key distribution protocols in transmission control protocol Kamarul Aizan, Nur Hanani A quantum key distribution (QKD) system produced shared secret key and transmitted the key between the sender and receiver in a highly secured transmission. QKD uses the fundamental of quantum properties of a single photon to provide a secured communication channel with absolute security guaranteed by the laws of physics. This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. The parameters used for this research are with attack and without attack, where measured by three measurements for both protocols which are final key length, expected key length by eavesdropper and error rate estimation. The 802.11i WLAN is consider as insecure because the tendency to be intercepted by intruders is high. Furthermore, the interference from other consumer devices such as cordless phone and microwave can contribute to degradation of WLAN performance. This type of noise can generate different numbers of final key length and different levels of error rate estimation. Thus, the level of the error rate estimation determined the secrecy of the secret key. The discussion of security issue between BB84 and B92 protocols also discussed in terms of secrecy and strength of the secret key between both protocols in 802.11i WLAN. 2012-01 Thesis NonPeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf Kamarul Aizan, Nur Hanani (2012) Quantum key distribution protocols in transmission control protocol. Masters thesis, Universiti Putra Malaysia. Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) |
spellingShingle | Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) Kamarul Aizan, Nur Hanani Quantum key distribution protocols in transmission control protocol |
title | Quantum key distribution protocols in transmission control protocol |
title_full | Quantum key distribution protocols in transmission control protocol |
title_fullStr | Quantum key distribution protocols in transmission control protocol |
title_full_unstemmed | Quantum key distribution protocols in transmission control protocol |
title_short | Quantum key distribution protocols in transmission control protocol |
title_sort | quantum key distribution protocols in transmission control protocol |
topic | Quantum theory Computer network protocols Key agreement protocols (Computer network protocols) |
url | http://psasir.upm.edu.my/id/eprint/30926/1/FSKTM%202012%204R.pdf |
work_keys_str_mv | AT kamarulaizannurhanani quantumkeydistributionprotocolsintransmissioncontrolprotocol |