Quantum Key Distribution (Man-In-The­Middle Attack)

Loading...
Thumbnail Image

Authors

Alhazmi, Shatha
Kandel, Prashanna
Sabovik, Jayne
Matondo-Mvula, Nadine

Issue Date

2023-03-24

Type

Other

Language

en_US

Keywords

Quantum Key Distribution , Cryptography , Cyber Attacks

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a man-in-the-middle attack. In this poster, we study how the man-in­the-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption that would be able to keep a man-in-the-middle attack from happening.

Description

Advisor: Prof. Khaled Elleithy. UB RISE 2023, School of Engineering, University of Bridgeport.

Citation

Publisher

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN