Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD)

Authors

  • Iqtidar Zohair Iqtidarz.alshammary@student.uokufa.edu.iq
  • Salah Albermany Salah.albermany@uokufa.edu.iq

DOI:

https://doi.org/10.31642/JoKMC/2018/060201

Keywords:

Multiparty QKD , RC6 block cipher

Abstract

The proposed B-MQKD method uses a quantum key distribution to generate a key and provide an authentication amongst many parties. It uses concepts of block cipher by using RC6 algorithm for encryption. The mix concept in B-MQKD (quantum and block cipher) gives the algorithm more authentication, randomness, and security which make it difficult to find the original message by attackers. In this paper using BB84 among three parties make it possiple to give the key to many users in a secret way.

Downloads

Download data is not yet available.

References

C. H. Bennett and G Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Theor. Comput. Sci., vol. 560, no. P1, pp. 7–11, 2014. DOI: https://doi.org/10.1016/j.tcs.2014.05.025

G Mogos and G Radu, “QKD PROTOCOLS – SOFTWARE IMPLEMENTATION BENNET- BRASSARD vs BRUSS,” vol , no , pp 81–84, 2015.

A. Goneid and A. M. Abbas, “Enhancement of Error Correction in Quantum Cryptography BB84 Protocol Enhancement of Error Correction in Quantum Cryptography BB8 Protocol,” no July, pp 0–12, 2014.

B Valiron, “Quantum computation: A tutorial,” New Gener. Comput., vol. 30, no. 4, pp. 271–296, 2012. DOI: https://doi.org/10.1007/s00354-012-0401-7

I. Journal, E. Science, and I. X. I. May, “Study of Bb8 Protocol Using Qkd Simulator,” vol I, no Xi, pp –444, 2015.

R. Rivest, M. J. B. Robshaw, R. Sidney, and Y L Yin, “The RC6 Block Cipher,” First Adv. Encryption …, 1998.

M. X. He, S. V. Petoukhov, and P. E. Ricci, “Genetic code, hamming distance and stochastic matrices,” Bull. Math. Biol., vol. 66, no. 5, pp. 1405–1421, 2004. DOI: https://doi.org/10.1016/j.bulm.2004.01.002

N. Hakiem, M. U. Siddiqi, and A. U. Priantoro, “Randomness Test of Cryptographic One- to-many Reversible Mapping for IPv6 address generation,” Journal of Theoretical and Applied Information Technology 69(3). November, 2014.

A. E. Belfedhal and K. M. Faraoun, “Building secure and fast cryptographic hash functions using programmable cellular automata,” J. Comput. Inf. Technol., vol. 23, no. 4, pp. 317–328, 2015. DOI: https://doi.org/10.2498/cit.1002639

Downloads

Published

2019-09-12

How to Cite

Zohair, I., & Albermany, S. (2019). Multiparty Quantum Cryptography with Block Cipher RC6 (B- MQKD). Journal of Kufa for Mathematics and Computer, 6(2). https://doi.org/10.31642/JoKMC/2018/060201

Similar Articles

You may also start an advanced similarity search for this article.