TY - JOUR
T1 - QKD-Enhanced Cybersecurity Protocols
AU - Djordjevic, Ivan B.
N1 - Funding Information:
Manuscript received February 18, 2021; revised March 24, 2021; accepted March 26, 2021. Date of publication March 30, 2021; date of current version April 23, 2021. This work was supported in part by L3Harris Technologies Inc. and NSF. Corresponding author: Ivan B. Djordjevic (e-mail: [email protected]).
Publisher Copyright:
© 2009-2012 IEEE.
PY - 2021/4
Y1 - 2021/4
N2 - Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography (PQC) is proposed as an alternative to QKD. However, the PQC protocols are based on conjecture that there are no polynomial time algorithms to break the PQC protocols. To overcome key challenges of both post-quantum cryptography and QKD, we propose to use the QKD only in initialization stage to set-up corresponding cybersecurity protocols. The proposed concept is applied to both computational security and PQC protocols. The proposed QKD-enhanced cybersecurity protocols are tolerant to attacks initiated by quantum computers.
AB - Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography (PQC) is proposed as an alternative to QKD. However, the PQC protocols are based on conjecture that there are no polynomial time algorithms to break the PQC protocols. To overcome key challenges of both post-quantum cryptography and QKD, we propose to use the QKD only in initialization stage to set-up corresponding cybersecurity protocols. The proposed concept is applied to both computational security and PQC protocols. The proposed QKD-enhanced cybersecurity protocols are tolerant to attacks initiated by quantum computers.
KW - Physical-layer security
KW - computational security
KW - information theoretic security
KW - post-quantum cryptography
KW - quantum key distribution (QKD)
UR - http://www.scopus.com/inward/record.url?scp=85103769803&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85103769803&partnerID=8YFLogxK
U2 - 10.1109/JPHOT.2021.3069510
DO - 10.1109/JPHOT.2021.3069510
M3 - Article
AN - SCOPUS:85103769803
SN - 1943-0655
VL - 13
JO - IEEE Photonics Journal
JF - IEEE Photonics Journal
IS - 2
M1 - 9390172
ER -