Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 481824, 6 pages
http://dx.doi.org/10.1155/2015/481824
Research Article

A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm

1Department of Computer Engineering, Eastern Mediterranean University, Northern Cyprus, Mersin 10, Turkey
2Department of Mathematics, Eastern Mediterranean University, Northern Cyprus, Mersin 10, Turkey
3Department of Physics, Eastern Mediterranean University, Northern Cyprus, Mersin 10, Turkey

Received 23 November 2014; Accepted 10 February 2015

Academic Editor: Kacem Chehdi

Copyright © 2015 Alharith A. Abdullah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Stallings, Cryptography and Network Security: Principles and Practice, Pearson Custom Computer Science Series, Prentice Hall, 5th edition, 2010.
  2. C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, New York, NY, USA, 1984.
  3. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental quantum cryptography,” Journal of Cryptology, vol. 5, no. 1, pp. 3–28, 1992. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Beige, B.-G. Englert, C. Kurtsiefer, and H. Weinfurter, “Secure communication with a publicly known key,” Acta Physica Polonica A, vol. 101, no. 3, pp. 357–368, 2002. View at Google Scholar · View at Scopus
  5. K. Boström and T. Felbinger, “Deterministic secure direct communication using entanglement,” Physical Review Letters, vol. 89, no. 18, pp. 187902–187905, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Wójcik, “Eavesdropping on the ‘ping-pong’ quantum communication protocol,” Physical Review Letters, vol. 90, no. 15, Article ID 157901, 2003. View at Publisher · View at Google Scholar · View at Scopus
  7. Q.-Y. Cai, “The ping-pong protocol can be attacked without eavesdropping,” Physical Review Letters, vol. 91, 2003. View at Publisher · View at Google Scholar · View at Scopus
  8. F.-G. Deng and G. L. Long, “Secure direct communication with a quantum one-time pad,” Physical Review A: Atomic, Molecular, and Optical Physics, vol. 69, no. 5, Article ID 052319, 2004. View at Publisher · View at Google Scholar · View at Scopus
  9. H. Hoffmann, K. Bostroem, T. Felbinger, F.-G. Deng, and G. L. Long, “Comment on ‘Secure direct communication with a quantum one-time pad’,” Physical Review A—Atomic, Molecular, and Optical Physics, vol. 72, no. 1, Article ID 016301, 2005. View at Publisher · View at Google Scholar · View at Scopus
  10. K. Mattle, H. Weinfurter, P. G. Kwiat, and A. Zeilinger, “Dense coding in experimental quantum communication,” Physical Review Letters, vol. 76, no. 25, pp. 4656–4659, 1996. View at Publisher · View at Google Scholar · View at Scopus
  11. I. P. Degiovanni, I. R. Berchera, S. Castelletto et al., “Quantum dense key distribution,” Physical Review A: Atomic, Molecular, and Optical Physics, vol. 69, no. 3, 2004. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Xia and H.-S. Song, “Controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding,” Physics Letters A, vol. 364, no. 2, pp. 117–122, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Liu, Y.-M. Liu, Y. Xia, and Z.-J. Zhang, “Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding,” Communications in Theoretical Physics, vol. 49, no. 4, pp. 887–890, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. L. Yang, L.-A. Wu, and S. Liu, “Quantum three-pass cryptography protocol,” in Quantum Optics in Computing and Communications, vol. 4917 of Proceedings of the SPIE, pp. 106–111, Shanghai, China, October 2002. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Kanamori and S. Moo-Yoo, “Quantum three-pass protocol: key distribution using quantum superposition states,” International Journal of Network Security & Its Applications, vol. 1, no. 2, 2009. View at Google Scholar
  16. N.-R. Zhou and G.-H. Zeng, “A realizable quantum encryption algorithm for qubits,” Chinese Physics, vol. 14, no. 11, pp. 2164–2169, 2005. View at Publisher · View at Google Scholar · View at Scopus
  17. N. R. Zhou, Y. Liu, G. H. Zeng, J. Xiong, and F. Zhu, “Novel qubit block encryption algorithm with hybrid keys,” Physica A: Statistical Mechanics and its Applications, vol. 375, no. 2, pp. 693–698, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. T. Hua, J. Chen, D. Pei, W. Zhang, and N. Zhou, “Quantum image encryption algorithm based on image correlation decomposition,” International Journal of Theoretical Physics, vol. 54, no. 2, pp. 526–537, 2015. View at Publisher · View at Google Scholar
  19. N. Sandip and A. Kumar, “Network security based on quantum cryptography & multiqubit hadamard matrices,” Global Journal of Computer Science and Technology, vol. 11, no. 12, 2011. View at Google Scholar
  20. Z. Cao and L. Liu, “Improvement of one quantum encryption scheme,” in Proceedings of the IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS '10), vol. 1, pp. 335–339, Xiamen, China, 2010. View at Publisher · View at Google Scholar
  21. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information, Cambridge University Press, 2010.
  22. Y. Kanamori, S.-M. Yoo, and M. Al-Shurman, “A quantum no-key protocol for secure data communication,” in Proceedings of the 43rd Annual Association for Computing Machinery Southeast Conference (ACM-SE '05), vol. 2, pp. 292–293, ACM, New York, NY, USA, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. L. S. Hill, “Cryptography in an algebraic alphabet,” The American Mathematical Monthly, vol. 36, no. 6, pp. 306–312, 1929. View at Publisher · View at Google Scholar · View at MathSciNet
  24. L. S. Hill, “Concerning certain linear transformation apparatus of cryptography,” The American Mathematical Monthly, vol. 38, no. 3, pp. 135–154, 1931. View at Publisher · View at Google Scholar · View at MathSciNet
  25. S. Saeednia, “How to make the hill cipher secure,” Cryptologia, vol. 24, no. 4, pp. 353–360, 2000. View at Publisher · View at Google Scholar
  26. J. Overbey, W. Traves, and J. Wojdylo, “On the keyspace of the hill cipher,” Cryptologia, vol. 29, no. 1, pp. 59–72, 2005. View at Publisher · View at Google Scholar
  27. D. Bouwmeester, A. Ekert, and A. Zeilinger, The Physics of Quantum Information, Springer, New York, NY, USA, 2000. View at Publisher · View at Google Scholar · View at MathSciNet