A Key Distribution Method Based on an Adaptive Combined Coding and Cryptographic System

Author(s):  
Ackburally M. Fezal ◽  
Soyjaudah K.M. Sunjiv
2018 ◽  
Vol 7 (3.34) ◽  
pp. 554
Author(s):  
Seung Hwan Ju ◽  
Hee Suk Seo

Background/Objectives: Security features are an essential part of recent smart metering systems. Smart meters are considered an important facility that must be protected by applying the latest security technologies.Methods/Statistical analysis: Security context determines the rules for applying/verifying security. DLMS/COSEM have Security suite to set of cryptographic algorithms. This is based on symmetric key based cryptographic communication. The high level security requires public key based cryptographic communication and digital signature.The security specification references the key scheme of DLMS-COSEM, which is based on a single set of unique symmetric keys per meter.Findings: we have studied a sequence for distributing security keys required by DLMS / COSEM.Our smart metering key distribution system can provide a security key management system such as key generation / distribution between AMI components. This is a PKI-based authentication using public key method (ECC), and a DLMS standard key distribution method after generating a session key using a public key. This system can also provide a key management scheme between DLMS clients not defined in the DLMS standard.Improvements/Applications: we analyze security requirements of DLMS/COSEM for secure smart metering and design key distribution/management method.  


2013 ◽  
Vol 9 (5) ◽  
pp. 389-392 ◽  
Author(s):  
He-qing Zhang ◽  
Yuan-yuan Zhou ◽  
Xue-jun Zhou ◽  
Pei-gen Tian

2018 ◽  
Vol 18 (9&10) ◽  
pp. 795-813
Author(s):  
Sunghoon Lee ◽  
Jooyoun Park ◽  
Jun Heo

Quantum key distribution (QKD) is a cryptographic system that generates an information-theoretically secure key shared by two legitimate parties. QKD consists of two parts: quantum and classical. The latter is referred to as classical post-processing (CPP). Information reconciliation is a part of CPP in which parties are given correlated variables and attempt to eliminate the discrepancies between them while disclosing a minimum amount of information. The elegant reconciliation protocol known as \emph{Cascade} was developed specifically for QKD in 1992 and has become the de-facto standard for all QKD implementations. However, the protocol is highly interactive. Thus, other protocols based on linear block codes such as Hamming codes, low-density parity-check (LDPC) codes, and polar codes have been researched. In particular, reconciliation using LDPC codes has been mainly studied because of its outstanding performance. Nevertheless, with small block size, the bit error rate performance of polar codes under successive-cancellation list (SCL) decoding with a cyclic redundancy check (CRC) is comparable to state-of-the-art turbo and LDPC codes. In this study, we demonstrate the use of polar codes to improve the performance of information reconciliation in a QKD system with small block size. The best decoder for polar codes, a CRC-aided SCL decoder, requires CRC-precoded messages. However, messages that are sifted keys in QKD are obtained arbitrarily as a result of a characteristic of the QKD protocol and cannot be CRC-precoded. We propose a method that allows arbitrarily obtained sifted keys to be CRC precoded by introducing a virtual string. Thus the best decoder can be used for reconciliation using polar codes and improves the efficiency of the protocol.


2019 ◽  
Vol XXII (1) ◽  
pp. 171-176
Author(s):  
Zisu L.

Quantum cryptography, the principles of which are based on classical mechanics laws, solves exceptionally the issue of key distribution in classical cryptography. BB84, the first quantum key distribution created by Charles Bennett and Gilles Brassard in 1984 offers unconditional security and allows the transmission of a key with the length equal to the length of the message. According to Vernom, using the key with the above feature once together with an encryption algorithm leads to the formation of a most secure cryptographic system. The paper presents a method for improving the BB84 quantum protocol, using ten states of polarization, quantum memory and direct communication in both directions. The implementation of both the proposed method and the BB84 protocol was done through a C# application.


Sign in / Sign up

Export Citation Format

Share Document