Quantum Encryption in a Wireless World - PowerPoint PPT Presentation

1 / 24
About This Presentation
Title:

Quantum Encryption in a Wireless World

Description:

... Key Distribution The Science of Secret Communications LA ... monitor the quantum channel ... method of authentication for public channel. Biometrics? ... – PowerPoint PPT presentation

Number of Views:27
Avg rating:3.0/5.0
Slides: 25
Provided by: J3155
Category:

less

Transcript and Presenter's Notes

Title: Quantum Encryption in a Wireless World


1
Quantum Encryption in a Wireless World
  • Presentation by
  • Jack Hughes

2
Topics
  • Review of Papers
  • Quantum Key Distribution The Science of Secret
    Communications LA-UR-04-8691
  • by Richard J. Hughes Physics Division Los Alamos
    National Laboratory
  • A Survey of 802.11a Wireless Security Threats and
    Security Mechanisms ITOC-TR-2003-101
  • by Colonel Donald J. Welch Ph.D. U.S. Army
  • Major Scott D. Lathrop U.S. Army

3
Topics Continued
  • Review of Papers cont.
  • Security Considerations for WiMAX-based Converged
    Networks
  • by Ramana Mylarvarapu for rfdesign.com August
    2005
  • Area of New Research
  • Quantum Encryption in a Wireless World

4
Quantum Key Distribution The Science of Secret
Communications
  • Abstract
  • Quantum key distribution (QKD) uses single photon
    communications to securely transfer cryptographic
    keys that are required for secure communications.
    I will describe the theory of QKD and its
    implementation in both optical fiber and
    free-space.
  • Relevance
  • Good overview of the principles of QKD
  • Lines of Research
  • Limitations

5
Quantum Key Distribution The Science of Secret
Communications
6
Quantum Key Distribution The Science of Secret
Communications
7
Quantum Key Distribution The Science of Secret
Communications
8
Quantum Key Distribution The Science of Secret
Communications
9
Quantum Key Distribution The Science of Secret
Communications
10
Quantum Key Distribution The Science of Secret
Communications
  • Alice and Bob
  • Protocol is 50 efficient (with no noise!)
  • Alice and Bob cannot predict which bits they will
    share
  • Eve
  • Cannot passively monitor the quantum channel
  • Public channel conveys no info about secret data
    bits
  • Public channel is authenticated

11
Quantum Key Distribution The Science of Secret
Communications
  • Good News
  • No passive eavesdropping
  • May offer one time pad level security in the
    future
  • Proven secure method of sharing keys
  • Bad News
  • Not immune to DoS
  • (But what is)
  • Still requires method of authentication for
    public channel
  • Biometrics?

12
A Survey of 802.11a Wireless Security Threats and
Security Mechanisms
  • Executive Summary (Edited)
  • This white paper first describes taxonomy of
    wireless LAN attack techniques.
  • We then describe the generic mechanisms
    available for authentication of users and the
    protection of the privacy and integrity of the
    data.
  • We conduct a basic analysis of each security
    countermeasure by looking at the attack
    techniques addressed by the mechanism.
  • We conclude by stating our recommendations for
    WLANs. These recommendations include
  • Mutual Authentication
  • Layer two encrypted tunnel
  • Strong cryptographic integrity verification

13
Quantum Key Distribution The Science of Secret
Communications
14
Wireless and Eavesdropping
  • Wireless systems
  • Omnidirectional
  • Easy to intercept packets
  • Directional
  • More difficult to collect packets
  • Easier than wired networks
  • Easier access
  • Point to point
  • Most difficult to collect packets
  • Often used at tall heights for line of sight
    advantage

15
A Survey of 802.11a Wireless Security Threats and
Security Mechanisms
16
A Survey of 802.11a Wireless Security Threats and
Security Mechanisms
  • Good News
  • With a strong encryption algorithm and the use of
    layer 2 tunneling protocols, The channel is very
    secure against many attacks
  • Bad News
  • Many businesses do not completely understand
    wireless insecurity and do not take proper
    precautions
  • Wireless is inherently susceptible to
    eavesdropping

17
OH NO!
  • Most wireless systems are NOT point to point
  • QKD requires line of sight
  • Where can we use QKD?

18
Security Considerations for WiMAX-based Converged
Networks
  • WiMax
  • Worldwide Interoperability for Microwave Access
  • AKA IEEE 802.16.
  • WiMAX standard was drafted with security in mind,
    offering more robust protection in the form of
    certificate-based encryption.
  • Still have problems
  • Client impersonation
  • Server impersonation
  • Message tampering
  • Session tampering/hijacking
  • Signaling requests resulting in DoS attacks

19
WiMAX flavors
  • non-line-of-sight
  • Where a small antenna on your computer connects
    to the tower. Uses 2 GHz to 11 GHz (similar to
    WiFi).
  • Lower-wavelength transmissions are not as easily
    disrupted by physical obstructions -- they are
    better able to diffract, or bend, around
    obstacles.
  • line-of-sight
  • Fixed dish antenna points straight at the WiMAX
    tower from a rooftop or pole.
  • Stronger and more stable, so it's able to send a
    lot of data with fewer errors.
  • Line-of-sight transmissions use higher
    frequencies, with ranges reaching a possible 66
    GHz. At higher frequencies, there is less
    interference and lots more bandwidth.

20
Integrating Quantum with Wireless
  • Use a line of sight optical connection in
    parallel with point to point WiMAX
  • Use BB84 or more advanced protocols for passing
    keys

21
Summary
  • QKD offers resistance to attacks that rely on
    eavesdropping
  • Non-optical wireless is inherently susceptible to
    eavesdropping
  • It seems like a match made in

22
Summary
  • However, most non-optical wireless is not point
    to point.
  • Use of point to point quantum communications in
    air has already been shown
  • But only a few non-optical wireless applications
    exist
  • Satellite
  • WiMax

23
Summary
  • Even if a QKD link is used with a non-optical
    wireless point to point link, We still need
    strong mutual authentication.
  • Possible use of QKD link with WiMax should be
    explored

24
Thank You
  • Please visit
  • http//www.cse.sc.edu/hughesjm/
Write a Comment
User Comments (0)
About PowerShow.com