{"title":"Integration of quantum cryptography in 802.11 networks","authors":"T. Nguyen, M. Sfaxi, S. Ghernaouti-Helie","doi":"10.1109/ARES.2006.75","DOIUrl":null,"url":null,"abstract":"Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First International Conference on Availability, Reliability and Security (ARES'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2006.75","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).