Quantum Key Distribution (Man-In-TheMiddle Attack)
Loading...
Authors
Alhazmi, Shatha
Kandel, Prashanna
Sabovik, Jayne
Matondo-Mvula, Nadine
Issue Date
2023-03-24
Type
Other
Language
en_US
Keywords
Quantum Key Distribution , Cryptography , Cyber Attacks
Alternative Title
Abstract
While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a man-in-the-middle attack. In this poster, we study how the man-inthe-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption that would be able to keep a man-in-the-middle attack from happening.
Description
Advisor: Prof. Khaled Elleithy.
UB RISE 2023, School of Engineering, University of Bridgeport.
