Aymen Ghilen

  • Citations Per Year
Learn More
In this paper, we aim at presenting a detailed classification of the most known authentication protocols using quantum means with calculation of quantum communication complexity. The Quantum Key Distribution protocols were basically proposed to establish secret keys that will be used later for encrypting and decrypting messages. Practically, QKD protocols(More)
In this paper, we present a quantum key distribution protocol with quantum authentication. The authentication process is based on the exchange of entangled pairs between a certification center and a communicator looking for being authenticated. The proposed scheme makes use of unitary quantum gates and the shared random number can be reused later for(More)
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we(More)
By relying upon the laws of quantum physics, quantum cryptography is reaching an extremely high level of security guarantee. It allows establishing a secret and perfectly random key material between two network nodes. It improves the contemporary cryptographic methods based only on computational security by integrating a quantum cryptographic solution.(More)
The expanded use of wireless networks has led to significant improvement in security approaches that aim to protect information. Providing secure communication for wireless local area network (WLAN) has become one of the prime concerns. The current standard for exchanging a secret key to authenticate users and ensure secure data transmission within EAP-TLS(More)
  • 1