Open Access Open Access  Restricted Access Subscription or Fee Access

Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography

D. Pavithra, S. Anitha

Abstract


Quantum key distribution - the creation of secret keys from quantum mechanical correlations - is an example of how physical methods can be used to solve problems in classical information theory.

Keywords


Authentication, Data Encryption Standard (DES), HTTP, Quantum Key Distribution (QKD), Open Systems interconnection (OSI), secret key, Trusted Center (TC)

Full Text:

PDF

References


M. Bellare and P. Rogaway, “Provably Secure Session Key Distribution: The Three Party Case,” Proc. 27th ACM Symp. Theory of Computing, pp. 57-66, 1995.

William Stallings, Cryptography and network security: Principles and practice, Prentice Hall, Upper Saddle River, New Jersey, 2003

"Data Compression Using Encrypted Text," paper submitted by Robert Franceschini, Amar Mukherjee, during Third International Forum on Research and Technology Advances in Digital Libraries (ADL '96), 1996.

The Data Encryption Standard (DES) and its Strength Against Attacks, Published in IBM Journal of Research and Development, volume 38, (no 3), pages 243-50 in 1994.

DES Algorithm: http://en.wikipedia.org/wiki/Data_Encryption_Standard


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.