Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD)
DOI:
https://doi.org/10.31642/JoKMC/2018/060201Keywords:
Multiparty QKD , RC6 block cipherAbstract
The proposed B-MQKD method uses a quantum key distribution to generate a key and provide an authentication amongst many parties. It uses concepts of block cipher by using RC6 algorithm for encryption. The mix concept in B-MQKD (quantum and block cipher) gives the algorithm more authentication, randomness, and security which make it difficult to find the original message by attackers. In this paper using BB84 among three parties make it possiple to give the key to many users in a secret way.Downloads
References
C. H. Bennett and G Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Theor. Comput. Sci., vol. 560, no. P1, pp. 7–11, 2014. DOI: https://doi.org/10.1016/j.tcs.2014.05.025
G Mogos and G Radu, “QKD PROTOCOLS – SOFTWARE IMPLEMENTATION BENNET- BRASSARD vs BRUSS,” vol , no , pp 81–84, 2015.
A. Goneid and A. M. Abbas, “Enhancement of Error Correction in Quantum Cryptography BB84 Protocol Enhancement of Error Correction in Quantum Cryptography BB8 Protocol,” no July, pp 0–12, 2014.
B Valiron, “Quantum computation: A tutorial,” New Gener. Comput., vol. 30, no. 4, pp. 271–296, 2012. DOI: https://doi.org/10.1007/s00354-012-0401-7
I. Journal, E. Science, and I. X. I. May, “Study of Bb8 Protocol Using Qkd Simulator,” vol I, no Xi, pp –444, 2015.
R. Rivest, M. J. B. Robshaw, R. Sidney, and Y L Yin, “The RC6 Block Cipher,” First Adv. Encryption …, 1998.
M. X. He, S. V. Petoukhov, and P. E. Ricci, “Genetic code, hamming distance and stochastic matrices,” Bull. Math. Biol., vol. 66, no. 5, pp. 1405–1421, 2004. DOI: https://doi.org/10.1016/j.bulm.2004.01.002
N. Hakiem, M. U. Siddiqi, and A. U. Priantoro, “Randomness Test of Cryptographic One- to-many Reversible Mapping for IPv6 address generation,” Journal of Theoretical and Applied Information Technology 69(3). November, 2014.
A. E. Belfedhal and K. M. Faraoun, “Building secure and fast cryptographic hash functions using programmable cellular automata,” J. Comput. Inf. Technol., vol. 23, no. 4, pp. 317–328, 2015. DOI: https://doi.org/10.2498/cit.1002639
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Iqtidar Zohair, Salah Albermany
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.