全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Development of a Post Quantum Encryption Key Generation Algorithm Using Electromagnetic Wave Propagation Theory

DOI: 10.4236/jis.2024.151005, PP. 53-62

Keywords: Key, Wave, Electromagnetic, Cryptography, Post, Quantum, Network, Protocol, Propagation, Algorithm

Full-Text   Cite this paper   Add to My Lib

Abstract:

In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.

References

[1]  Theis, T.N. and Philip Wong, H.-S. (2015) The End of Moore’s Law: A New Beginning for Information Technology. Computing in Science & Engineering, 19, 41-50.
https://doi.org/10.1109/MCSE.2017.29
[2]  Huang, W., Nizam, M. H., Andonovic, I. and Tur, M. (2000) Coherentoptical CDMA (OCDMA) Systemsused for High-Capacityopticalfiber Networks-System Description, OTDMA Comparison, and OCDMA/WDMA Networking. Journal of Lightwave Technology, 18, 765-778.
https://doi.org/10.1109/50.848384
[3]  Chithralekha, T., Singh, K., Ganeshvani, G. and Rajarajan, M. (2021) Code-Based Post-Quantum Cryptography. Journal Not Specified, 24 p.
[4]  Reina, J.H. (2009) Fundamentals of Information and Computation in the Realm of the Quanta. Revista de la Academia Colombiana de Ciencias Exactas, Fisicas y Naturales, 33, 201.
[5]  Joux, A. and Narayanan, A.K. (2019) Drinfeld Modules May not Be for Isogenybasedcryptography. Cryptology ePrint Archive, 16 p.
[6]  Malina, L., et al. (2021) Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access, 9, 36038-36077.
https://doi.org/10.1109/ACCESS.2021.3062201
[7]  Messiah, A. (2014) Quantum Mechanics. Courier Corporation, Chelmsford.
[8]  Gagnidze, A., Iavich, M. and Iashvili, G. (2017) Analysis of Post Quantum Cryptography Use in Practice. Bulletin of the Georgian National Academy of Sciences, 11, 29-36.
[9]  Papon, P. (2017) Moore’s Law Anticipates the Future of Electronics. Futuribles, 417, 79-84.
https://doi.org/10.3917/futur.417.0079
[10]  Rabia, A. (2021) électromagnétisme: Propagation des ondes électromagnétiques-Lois et équations. Propagations libre et guidée-Cours, exemples et exercices corrigés. Editions Ellipses, Paris, 348 p.
[11]  Zijlstra, T. (2020) Secure Hardware Acceleration for Post-Quantum Cryptography. Ph.D. Thesis, Université de Bretagne Sud, Lorient.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133