Applicability of Quantum Cryptography for Securing Mobile Communication Networks

نویسندگان

  • Michael Marhoefer
  • Ilse Wimberger
  • Andreas Poppe
چکیده

After 20 years of basic research, quantum cryptography has meanwhile led to first commercial products. Its progress has triggered high publicity and additional R&D funding. The aim of this paper is to evaluate the status of quantum cryptography regarding its practical applicability for securing (mobile) communication networks. With that aim in mind, the paper presents a survey of the state-of-the-art, an analysis of its practical constraints and still open R&D challenges, and some candidate applications for securing mobile communication networks. First industrial applications of quantum cryptography have become reality; more applications may soon reach practical maturity due to recent technological progress.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

Review of MANETS Using Distributed Public-key Cryptography

Ensuring security is something that is not easily done as many of the demands of network security conflict with the demands of mobile networks, majorly because of the nature of the mobile devices (e.g. low power consumption, low processing load). The study of secure distributed key agreement has great theoretical and practical significance. Securing Mobile Ad-hoc Networks using Distributed Publ...

متن کامل

Securing Wireless Ad Hoc Networks:Towards A Mobile Agent Security Architecture

Achieving secure communication is especially challenging in wireless ad hoc networks, where no infrastructure or central authority exists, and the state and topology of the network is dynamic and fault-prone. These unique characteristics of wireless ad hoc networks make traditional cryptographic mechanisms and assumptions inappropriate. In this paper, we propose mobile agents as a solution to t...

متن کامل

Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...

متن کامل

RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs

A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in these networks is challenging. Threshold Cryptography (TC) provides a promise of securing these networks. In this paper, we discuss our RSA-based Threshold Cryptography (RSA-TC) and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006