Skip to Navigation
Auburn University Homepage
A-Z Index | Map | People Finder
Auburn University Logo
Electronic Theses and Dissertations
Skip to Main Content
Main Navigation 
  • AUETD Home
  • Graduate School
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  •   AUETD Home
  • View Item
  •   AUETD Home
  • View Item

Trusted, Third-Party Authenticated, Quantum Key Distribution

View/Open
HoodFinalv2.pdf (971.7Kb)
Date
2016-08-05
Author
Hood, Jonathan
Type of Degree
PhD Dissertation
Department
Computer Science and Software Engineering
Metadata
Show full item record
Abstract
This dissertation presents an algorithm that provides a way of establishing trust and authentication. The protocol negotiates a key using extensions to QKD algorithms that include non-repudiation and endpoint verification through a trusted third-party. The new algorithm proves the viability of implementing a trusted third-party in a QKD scheme. Due to the capacity of quantum algorithms, the complexity of the new method is not meaningful to calculate using traditional big O methods. However, the Kolmogorov complexity calculation can be used to determine a form of the algorithm's complexity by measuring the operations it takes the algorithm to reach a successful state of entropy. Additional padding and negotiation with the third party yields a longer entropy calculation than QKD-only algorithms. A reference implementation for the presented algorithm is provided. To test the reference implementation, a simulated quantum environment is created. The quantum simulation model and its correctness in implementing the newly created algorithm are validated for using standard model verification techniques. Experimentation is set up as a "pass" or "fail" scenario. If any party is unable to unpad or decrypt a message, the algorithm is deemed a failure. If a party runs out of negotiated qubits, an entropy error is recorded and up to three retries are attempted. Experimentation on key sizes of at least 100 bits results in successful trusted key negotiation with 99.9999999987% confidence. The results of the experiment culminate in a new algorithm, dubbed HHUYS16, which can be implemented using current technology. This could particularly be useful to government systems that require a quantum network and its assets to be secured. Implementation guidance is provided in the form of a QKD Security Implementation Technical Guideline (STIG); however, DoD implementation requires further coordination among organizations. Further improvements and clarifications can be made with the National Institute of Standards and Technology's (NIST) proper identification of quantum-resistant encryption algorithms.
Files
Name:
HoodFinalv2.pdf  
Size:
971.7Kb
URI
http://hdl.handle.net/10415/5373

Browse

All of AUETDBy Issue DateAuthor / AdvisorTitlesDepartments

My Account

Login

Auburn University Libraries | 231 Mell Street | Auburn, Alabama 36849 | (334) 844-4500 or (800) 446-0387 |

 

Auburn University |Auburn, Alabama 36849 |(334) 844-4000 |

Website Feedback |Privacy |Copyright ©