Streaming authentication and multi-level security for communications networks using quantum cryptography
Abstract
Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.
- Inventors:
- Issue Date:
- Research Org.:
- Los Alamos National Laboratory (LANL), Los Alamos, NM (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 2222249
- Patent Number(s):
- 11743049
- Application Number:
- 16/799,116
- Assignee:
- Triad National Security, LLC (Los Alamos, NM)
- DOE Contract Number:
- AC52-06NA25396
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 02/24/2020
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Hughes, Richard J., Nordholt, Jane E., Peterson, Charles G., Tyagi, Kush T., Wipf, Christopher C., Newell, Raymond T., McCabe, Kevin P., and Dallmann, Nicholas. Streaming authentication and multi-level security for communications networks using quantum cryptography. United States: N. p., 2023.
Web.
Hughes, Richard J., Nordholt, Jane E., Peterson, Charles G., Tyagi, Kush T., Wipf, Christopher C., Newell, Raymond T., McCabe, Kevin P., & Dallmann, Nicholas. Streaming authentication and multi-level security for communications networks using quantum cryptography. United States.
Hughes, Richard J., Nordholt, Jane E., Peterson, Charles G., Tyagi, Kush T., Wipf, Christopher C., Newell, Raymond T., McCabe, Kevin P., and Dallmann, Nicholas. Tue .
"Streaming authentication and multi-level security for communications networks using quantum cryptography". United States. https://www.osti.gov/servlets/purl/2222249.
@article{osti_2222249,
title = {Streaming authentication and multi-level security for communications networks using quantum cryptography},
author = {Hughes, Richard J. and Nordholt, Jane E. and Peterson, Charles G. and Tyagi, Kush T. and Wipf, Christopher C. and Newell, Raymond T. and McCabe, Kevin P. and Dallmann, Nicholas},
abstractNote = {Message authenticators for quantum-secured communications facilitate low-latency authentication with assurances of security. Low-latency message authenticators are especially valuable in infrastructure systems where security and latency constraints are difficult to satisfy with conventional non-quantum cryptography. For example, a message transmitter receives a message and derives an authentication tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message transmitter outputs the message and its authentication tag. A message receiver receives a message and authentication tag for the message. The message receiver derives a comparison tag for the message based at least in part on an authenticator that uses one or more quantum keys. The message receiver checks whether the message is authentic based on a comparison of the authentication tag and the comparison tag. In example implementations, the authenticator uses stream-wise cyclic redundancy code operations.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2023},
month = {8}
}
Works referenced in this record:
Very simple method to find the minimum polynomial of an arbitrary nonzero element of a finite field
journal, January 1976
- Gordon, J. A.
- Electronics Letters, Vol. 12, Issue 25
Public key encryption apparatus
patent-application, April 2006
- Fujii, Mikio
- US Patent Document 11/254719; 20060088157
Universal-hash-function-family calculation unit and shared-key generation system
patent, April 2011
- Obana, Satoshi; Tanaka, Akihiro
- US Patent Document 7,933,905
System and Method for Providing Two-Way Communication of Quantum Signals, Timing Signals, and Public Data
patent-application, May 2006
- Mitchell, J. Howell; Vig, Harry N.; Zavriyev, Anton
- US Patent Application 10/978973; 20060093376
Frame Synchronization Method for QKD Systems
patent-application, February 2008
- Berzanskis, Audrius; Kwok, Brandon; Vig, Harry
- US Patent Application 11/503774; 20080037790
High-Rate Quantum Key Distribution Scheme Relying on Continuously Phase and Amplitude-Modulated Coherent Light Pulses
patent-application, June 2004
- Cert, Nicolas; Brouri-Tualle, Rosa; Grangier, Phillippe
- US Patent Application 10/615490; 20040109564
Quantum Key Distribution Method and Communication Apparatus
patent-application, June 2008
- Matsumoto, Wataru
- US Patent Application 10/588803; 20080144833
Key generating apparatus, program, and method
patent, August 2010
- Akiyama, Koichiro; Goto, Yasuhiro
- US Patent Document 7,787,623
UNIVERSAL-HASH-FUNCTION-FAMILY CALCULATION UNIT AND SHARED-KEY GENERATION SYSTEM
patent-application, September 2009
- Obana, Satoshi; Tanaka, Akihiro
- US Patent Application 12/067618; 20090240913
Fast Construction of Irreducible Polynomials over Finite Fields
journal, May 1994
- Shoup, Victor
- Journal of Symbolic Computation, Vol. 17, Issue 5
Fixed-point analysis and realization of a blind beamforming algorithm
conference, November 1999
- Xu, Fan; Fu, Dengwei; Willson, Alan N.
- SPIE Proceedings
Method and System Utilizing Quantum Authentication
patent-application, April 2009
- Wang, Jingyi
- US Patent Application 12/253256; 20090106553 A1
System and methods for quantum key distribution over WDM links
patent, December 2009
- Luo, Yuhui; Chan, Kam Tai
- US Patent Document 7,639,947
Encryption Apparatus, Decryption Apparatus, Key Generation Apparatus, Program, and Method
patent-application, December 2005
- Akiyama, Koichiro; Goto, Yasuhiro
- US Patent Application 11/128283; 20050271203
Method and Device for Mutual Authentication
patent-application, May 2010
- Roscoe, Andrew William
- US Patent Application 12/520475; 20100115277
LFSR-based Hashing and Authentication
conference, January 1994
- Krawczyk, Hugo; Desmedt, Yvo G.
- Advances in Cryptology — CRYPTO ’94, p. 129-139