Open Access
Subscription or Fee Access
Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography
Abstract
Quantum key distribution - the creation of secret keys from quantum mechanical correlations - is an example of how physical methods can be used to solve problems in classical information theory.
Keywords
Authentication, Data Encryption Standard (DES), HTTP, Quantum Key Distribution (QKD), Open Systems interconnection (OSI), secret key, Trusted Center (TC)
Full Text:
PDFReferences
M. Bellare and P. Rogaway, “Provably Secure Session Key Distribution: The Three Party Case,” Proc. 27th ACM Symp. Theory of Computing, pp. 57-66, 1995.
William Stallings, Cryptography and network security: Principles and practice, Prentice Hall, Upper Saddle River, New Jersey, 2003
"Data Compression Using Encrypted Text," paper submitted by Robert Franceschini, Amar Mukherjee, during Third International Forum on Research and Technology Advances in Digital Libraries (ADL '96), 1996.
The Data Encryption Standard (DES) and its Strength Against Attacks, Published in IBM Journal of Research and Development, volume 38, (no 3), pages 243-50 in 1994.
DES Algorithm: http://en.wikipedia.org/wiki/Data_Encryption_Standard
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.