Abdelmalek Azizi

Learn More
The two models of traditional cryptography (symmetric encryption and asymmetric encryption) are confronted, in addition to the difficulty in creating credible keys of encoding/decoding, to the problem of distributing keys with perfect security. We present in this article results of a simulation of successful eavesdropping when exchanging keys with RSA(More)
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers(More)
Quantum Key Distribution (QKD) or quantum cryptography has been developed within the last decade; it is proved that QKD is secure against computer attacks and it is considered as a promising solution towards absolute security within long-term cryptosystems. Currently, research efforts are required to make strongly secure the existing communication(More)
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts(More)
This paper presents a methodology for analyzing quantum information systems, based on model checking; particularly we are interested in the protocol of quantum key distribution B92. It has been proved that this protocol is unconditionally secure against all kinds of attacks according to the information theory, but this security proof is not easily adaptable(More)
Since it was noted that quantum computers could break public key cryptosystems based on number theory, extensive studies have been undertaken on Quantum Key Distribution (QKD). QKD or Quantum Cryptography solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the(More)
— Using watermarking techniques to embed the Electronics Patient Records (EPR) data in the medical images improves the confidentiality of the patient data. However, this technique has some limitations if it is used alone; it will not be efficient in term of patient data security which is a primordial goal. In this paper, we will introduce a new mechanism to(More)
The smart cards are increasingly used in several fields with critical data that require security. We cite, as example, the medical field and payment shopping with smart card. Therefore, the hardware and software security of smart cards is one of the key elements of the security of sensitive information handled. Currently, several scientific researchers are(More)