In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes the
fundamental chaos characteristics. The designs of the major components of the cipher are
given. Its cryptographic properties of period, auto- and cross-correlations, and the
mixture of Markov processes and spatiotemporal effects are investigated. The cipher is
resistant to the related-key-IV, Time/Memory/Data tradeoff, algebraic, and chosen-text
attacks. The keystreams successfully passed two batteries of statistical tests and the
encryption speed is comparable with RC4.
Based on the law of quantum mechanics we present a simple authorization scheme:
Quauth. The description of the scheme is given in details. The authorization is
accomplished through a quantum channel by one way communication. We show that
eavesdropper gets no information about key no matter how many times s/he is listening
on the channel. The scheme is robust against both the passive and active attacks. By
induction we prove that the scheme is information theoretically secure.
Quantum correlations or entanglement is a basic ingredient for many applications of quantum information theory.One important application using quantum entanglement exploits the correlation nature of entangled photon states is quantum key distribution, which is proven unbreakable in principle and provides the highest possible security that is impossible in classical information theory. However, generating entangled photon pairs is not a simple task -- only approximately one out of a million pump photons decay into a signal and idler photon pair. This low rate of entangled photon
pairs is further reduced by the overhead required in order for the rectification of the inevitable errors due to channel imperfections or caused by potential eavesdroppers. As a consequence, quantum key distribution suffers from a low bit rate, which is in the order of hundreds to thousands bits per second or below. On the other hand, the classical public key distribution does not impose a tight limit on the transmission rate. However, it is subject to the
risks of eavesdroppers sitting in the middle of the insecure channel. In this paper, we propose a hybrid key distribution method which uses public key distribution method to generate a raw key,
and then uses entanglement assisted communication to modify the raw key by inserting a number of quantum bits in the raw key. Building upon the foundation of the unconditional security of quantum key distribution, we use the privacy amplification to make the affection of inserted bits expand to a whole key. Our quantum entanglement assisted key distribution scheme greatly improves the efficiency of key distribution while without compromising the level of security achievable by quantum cryptography.
If an eavesdropper Eve is equipped with quantum computers, she can easily break the public key exchange protocols used today. In this paper we will discuss the post-quantum Diffie-Hellman key exchange and private key exchange protocols.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.