Learn More
In this paper, we aim at presenting a detailed classification of the most known authentication protocols using quantum means with calculation of quantum communication complexity. The Quantum Key Distribution protocols were basically proposed to establish secret keys that will be used later for encrypting and decrypting messages. Practically, QKD protocols(More)
The expanded use of wireless networks has led to significant improvement in security approaches that aim to protect information. Providing secure communication for wireless local area network (WLAN) has become one of the prime concerns. The current standard for exchanging a secret key to authenticate users and ensure secure data transmission within EAP-TLS(More)
In a security context, to render a cryptosystem more resistant against man-in-the-middle and impersonation attacks, an authentication mechanism has to be considered. CHAP protocol (Challenge Handshake Authentication Protocol) is among the most widely spread authentication technique used within Local Area Networks. To offer greater robustness and privacy, we(More)
By relying upon the laws of quantum physics, quantum cryptography is reaching an extremely high level of security guarantee. It allows establishing a secret and perfectly random key material between two network nodes. It improves the contemporary cryptographic methods based only on computational security by integrating a quantum cryptographic solution.(More)
  • 1