Society becomes more and more electronic and many daily applications, like those of e-commerce, need a height level of security because of the sensitivity of the manipulated data. Cryptography is the main way to ensure security of data, such passwords, cards numbers, etc. However, the classical cryptography suffers from relevant problematic of secured key sharing. According to Shannon theory, a secured encryption key is the one generated randomly and used only once time. The Quantum Key Distribution, based on quantum physic lows, offers the opportunity to generate such a key. It seems also, to be the only technique that does not present vulnerability against the quantum calculating power.In this paper, we present an enhanced scheme for deriving a secured encryption key for WLAN using the quantum key distribution principals.
In our case we present an enhanced proposition of integrating the Quantum Key Distribution, QKD , in the 802.1 Ii. Figure 1. In symmetric cryptosy stem the same key is used to encrypt and decrypt the message; the key must be exchanged before starting transmission. B. Asymmetric cryptosystemUsing an asymmetric cryptosystem, the participants, Alice end Bob, used a pair of key (private, public), where, generally, the public key is used to encrypt and the private key to decrypt the message. So if Alice wants to send a message to Bob , she encrypts the message using Bob ' s public key, then sends it to Bob. Any other participant can performs this operation. Once received from Bob, he is the only one who can decrypt the message via the private key; this later is never revealed, so Bob is the only one who can read the message.The rest of the article is organized as follow: in section two, we briefly present the two main types of cryptosystem, in section three we introduce the principal of quantum key distribution, in the forth section we present an existent proposition of integrating the QKD in the 802.11 i, then we pres ent our new proposed scheme for such integration. We conclude the article by a further works and perspectives. II. CLASSICAL CRYPTOSYSTEM A. Symmetric cryptosys temIn such a cryptosystem, the sender and the recei ver used the same and unique key to encrypt a message M, into another one M'. So, in that case every two participants of the communication need to have a shared key. So for N participants N(N-l )/2 keys are need. But if N grows, it becomes quickly impracticable to manage.In the other hand, the participants need to share the secret key, before starting any transmission, thing that brings us to the point zero.Abstract-User 's mobility is increasing with the height level of mobility that the mobile networks offer. The information transmitted from A to B in a network has to be secured from any eavesdropping, so the main solution used is the cryptography.Nevertheless, the classical cryptography suffers from some limits that make it vulnerable in front of some kind of attacks like "attack by dictionary" or "exhaustive attack". In the other hand, the miniaturisation in processor industry (Moor's law) causes interferences. For that purpose and other new field appear to overcome that kind of problem. That is "Quantum cryptography".In the present paper we will present an enhanced proposition of integration the Q KD in the 802.11i.
Eulerian walks are paths that visit each edge once in a connected graph. When the extremities of the walk are confused, then it is called Eulerian cycle or closed Eulerian walk. Introduced by Euler in 1736, Eulerian cycle concept was the historical beginning of the Graph theory. On account of the difficulty to get an Eulerian walk in a nonspecific graph, many problems were formulated with the aim to find a “weak Eulerian” walk. Thus, Chinese walk and cycle concept appeared consisting of visiting all edges of a connected graph at least one time. This concept was introduced due to the Kwan studies for postman problem. Furthermore, as each graph admits a Chinese walk, and a cycle respectively, postman studies has been of use in many modeling formulations and has given a wide range of applications relevant to transportation, urban planning, and industrial manufacturing among others. Laser or water cutting presents a technology for industrial manufacturing consisting of using water or laser to cut (metallic) materials for producing tools where it is plausible to follow Chinese walks to ensure efficiency.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.