The document discusses integrating quantum cryptography into 802.11 networks. It describes characteristics of 802.11 networks and existing authentication and key distribution methods. It then outlines several quantum key distribution techniques like entangled photons and continuous variable that could be used. The document proposes a modified version of the 802.11i 4-way handshake protocol that incorporates a "quantum handshake" as the first step to integrate quantum cryptography. It concludes this would help secure communications in 802.11 networks.
The document discusses integrating quantum cryptography into 802.11 networks. It describes characteristics of 802.11 networks and existing authentication and key distribution methods. It then outlines several quantum key distribution techniques like entangled photons and continuous variable that could be used. The document proposes a modified version of the 802.11i 4-way handshake protocol that incorporates a "quantum handshake" as the first step to integrate quantum cryptography. It concludes this would help secure communications in 802.11 networks.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online from Scribd
The document discusses integrating quantum cryptography into 802.11 networks. It describes characteristics of 802.11 networks and existing authentication and key distribution methods. It then outlines several quantum key distribution techniques like entangled photons and continuous variable that could be used. The document proposes a modified version of the 802.11i 4-way handshake protocol that incorporates a "quantum handshake" as the first step to integrate quantum cryptography. It concludes this would help secure communications in 802.11 networks.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online from Scribd
means “secret writing". However we use the term to refer to the science and art of transforming the messages to make them secure and immune to attacks. Characteristics of WLAN 802.11 networks WLAN 802.11 is mainly used in office and campus environments The mobility speed of mobile users in WLAN 802.11 is relatively slower in comparison with cellular networks WLAN 802.11 terminals have more computational capacity than cellular networks. WLAN 802.11 is used to provide access to the internet through an access point installed by a wireless ISP(Internet Service Provider). Authentication Key Management Summary of authentication and key distribution in 802.11i networks The 4-way Handshake Photon Exchange Validation of bob bases Some Quantum Key Distribution techniques Auto compensating weak laser pulse system Entangled photons Continuous Variable Free Space Quantum Handshake Conclusion Quantum transmission with polarization photons Integrating quantum key distribution in 802.11i A modified version of 4-way handshake Quantum handshake is first step in integration of quantum cryptography References B.Schneier, Applied Cryptography ,John Wiley & son,1996 IEEE standard 802.1X ,Port-based Network Access Control, December 2004 D.Mayers, ”Unconditional Security in Quantum Cryptography”, Journal of the ACM ,vol.48,1998,pp.35t B.Aboba, D.Simon, ”PPP EAP TLS Authentication Protocol”, RFC 2716,October 1999 K. G. Paterson, F. Piper, and R.Schack, “Why quantum cryptography?”, Quantum physics,quant- ph/0406147,June 2004