Streaming authentication and multi-level security for communications networks using quantum cryptography
Abstract
Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.
- Inventors:
- Issue Date:
- Research Org.:
- Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1632595
- Patent Number(s):
- 10574461
- Application Number:
- 15/026,024
- Assignee:
- Triad National Security, LLC (Los Alamos, NM)
- Patent Classifications (CPCs):
-
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- DOE Contract Number:
- AC52-06NA25396
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 09/30/2014
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING
Citation Formats
Hughes, Richard John, Nordholt, Jane Elizabeth, Peterson, Charles Glen, Tyagi, Kush T., Wipf, Christopher C., Newell, Raymond Thorson, McCabe, Kevin P., and Dallmann, Nicholas. Streaming authentication and multi-level security for communications networks using quantum cryptography. United States: N. p., 2020.
Web.
Hughes, Richard John, Nordholt, Jane Elizabeth, Peterson, Charles Glen, Tyagi, Kush T., Wipf, Christopher C., Newell, Raymond Thorson, McCabe, Kevin P., & Dallmann, Nicholas. Streaming authentication and multi-level security for communications networks using quantum cryptography. United States.
Hughes, Richard John, Nordholt, Jane Elizabeth, Peterson, Charles Glen, Tyagi, Kush T., Wipf, Christopher C., Newell, Raymond Thorson, McCabe, Kevin P., and Dallmann, Nicholas. Tue .
"Streaming authentication and multi-level security for communications networks using quantum cryptography". United States. https://www.osti.gov/servlets/purl/1632595.
@article{osti_1632595,
title = {Streaming authentication and multi-level security for communications networks using quantum cryptography},
author = {Hughes, Richard John and Nordholt, Jane Elizabeth and Peterson, Charles Glen and Tyagi, Kush T. and Wipf, Christopher C. and Newell, Raymond Thorson and McCabe, Kevin P. and Dallmann, Nicholas},
abstractNote = {Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2020},
month = {2}
}