A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm

A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical problems in engineering 2015-01, Vol.2015 (2015), p.1-6
Hauptverfasser: Abdullah, Alharith Abdulkareem, Riza, Mustafa, Khalaf, Rifaat Zaidan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 6
container_issue 2015
container_start_page 1
container_title Mathematical problems in engineering
container_volume 2015
creator Abdullah, Alharith Abdulkareem
Riza, Mustafa
Khalaf, Rifaat Zaidan
description A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as a qubit and after the encoded message is transferred into photons, the polarization of each photon is rotated by an angle θj, which is chosen randomly for each qubit. The sender and receiver agree over a Hill-cipher key, the encryption occurs by utilization of the quantum three-pass protocol (QTPP), the decryption will be illustrated, and an example shows how the algorithm will work. Finally, the security of this algorithm is analyzed in detail.
doi_str_mv 10.1155/2015/481824
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1677962819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3617729721</sourcerecordid><originalsourceid>FETCH-LOGICAL-c389t-f152140bf1d69bda38058a329edbd9c8a0ff75a284efd34cb001a1125fb63e3b3</originalsourceid><addsrcrecordid>eNqF0MFLwzAUBvAiCs7pybsUvIhSl5c0bXqcQ50gOGWKt5K2LzYja2bSIvrX21EP4sXT-w4_Ph5fEBwDuQTgfEIJ8EksQNB4JxgBT1jEIU53-0xoHAFlr_vBgfcrQihwEKPgZRo-oTT6SxYGw8dONm23Dpe1Q4wW0vtw4WxrS2vCadfW2LS6lK22TXglPVZhH-bamGimNzW6cGrerNNtvT4M9pQ0Ho9-7jh4vrlezubR_cPt3Wx6H5VMZG2kgFOISaGgSrKikkwQLiSjGVZFlZVCEqVSLqmIUVUsLgtCQAJQroqEISvYODgbejfOvnfo23ytfYnGyAZt53NI0jRLqICsp6d_6Mp2rum_61UCjKRCQK8uBlU6671DlW-cXkv3mQPJtxvn243zYeNenw-61k0lP_Q_-GTA2BNU8hdOWUYz9g3GnYRF</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1661307881</pqid></control><display><type>article</type><title>A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Wiley Online Library (Open Access Collection)</source><source>Alma/SFX Local Collection</source><creator>Abdullah, Alharith Abdulkareem ; Riza, Mustafa ; Khalaf, Rifaat Zaidan</creator><contributor>Chehdi, Kacem</contributor><creatorcontrib>Abdullah, Alharith Abdulkareem ; Riza, Mustafa ; Khalaf, Rifaat Zaidan ; Chehdi, Kacem</creatorcontrib><description>A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as a qubit and after the encoded message is transferred into photons, the polarization of each photon is rotated by an angle θj, which is chosen randomly for each qubit. The sender and receiver agree over a Hill-cipher key, the encryption occurs by utilization of the quantum three-pass protocol (QTPP), the decryption will be illustrated, and an example shows how the algorithm will work. Finally, the security of this algorithm is analyzed in detail.</description><identifier>ISSN: 1024-123X</identifier><identifier>EISSN: 1563-5147</identifier><identifier>DOI: 10.1155/2015/481824</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Authentication ; Coding ; Communication ; Cryptography ; Encryption ; Mathematical analysis ; Mathematical problems ; Messages ; Photons ; Protocol ; Qubits (quantum computing) ; Receivers</subject><ispartof>Mathematical problems in engineering, 2015-01, Vol.2015 (2015), p.1-6</ispartof><rights>Copyright © 2015 Alharith A. Abdullah et al.</rights><rights>Copyright © 2015 Alharith A. Abdullah et al. Alharith A. Abdullah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c389t-f152140bf1d69bda38058a329edbd9c8a0ff75a284efd34cb001a1125fb63e3b3</citedby><cites>FETCH-LOGICAL-c389t-f152140bf1d69bda38058a329edbd9c8a0ff75a284efd34cb001a1125fb63e3b3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,27929,27930</link.rule.ids></links><search><contributor>Chehdi, Kacem</contributor><creatorcontrib>Abdullah, Alharith Abdulkareem</creatorcontrib><creatorcontrib>Riza, Mustafa</creatorcontrib><creatorcontrib>Khalaf, Rifaat Zaidan</creatorcontrib><title>A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm</title><title>Mathematical problems in engineering</title><description>A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as a qubit and after the encoded message is transferred into photons, the polarization of each photon is rotated by an angle θj, which is chosen randomly for each qubit. The sender and receiver agree over a Hill-cipher key, the encryption occurs by utilization of the quantum three-pass protocol (QTPP), the decryption will be illustrated, and an example shows how the algorithm will work. Finally, the security of this algorithm is analyzed in detail.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Coding</subject><subject>Communication</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Mathematical analysis</subject><subject>Mathematical problems</subject><subject>Messages</subject><subject>Photons</subject><subject>Protocol</subject><subject>Qubits (quantum computing)</subject><subject>Receivers</subject><issn>1024-123X</issn><issn>1563-5147</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0MFLwzAUBvAiCs7pybsUvIhSl5c0bXqcQ50gOGWKt5K2LzYja2bSIvrX21EP4sXT-w4_Ph5fEBwDuQTgfEIJ8EksQNB4JxgBT1jEIU53-0xoHAFlr_vBgfcrQihwEKPgZRo-oTT6SxYGw8dONm23Dpe1Q4wW0vtw4WxrS2vCadfW2LS6lK22TXglPVZhH-bamGimNzW6cGrerNNtvT4M9pQ0Ho9-7jh4vrlezubR_cPt3Wx6H5VMZG2kgFOISaGgSrKikkwQLiSjGVZFlZVCEqVSLqmIUVUsLgtCQAJQroqEISvYODgbejfOvnfo23ytfYnGyAZt53NI0jRLqICsp6d_6Mp2rum_61UCjKRCQK8uBlU6671DlW-cXkv3mQPJtxvn243zYeNenw-61k0lP_Q_-GTA2BNU8hdOWUYz9g3GnYRF</recordid><startdate>20150101</startdate><enddate>20150101</enddate><creator>Abdullah, Alharith Abdulkareem</creator><creator>Riza, Mustafa</creator><creator>Khalaf, Rifaat Zaidan</creator><general>Hindawi Publishing Corporation</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>7U5</scope><scope>L7M</scope></search><sort><creationdate>20150101</creationdate><title>A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm</title><author>Abdullah, Alharith Abdulkareem ; Riza, Mustafa ; Khalaf, Rifaat Zaidan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c389t-f152140bf1d69bda38058a329edbd9c8a0ff75a284efd34cb001a1125fb63e3b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Coding</topic><topic>Communication</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Mathematical analysis</topic><topic>Mathematical problems</topic><topic>Messages</topic><topic>Photons</topic><topic>Protocol</topic><topic>Qubits (quantum computing)</topic><topic>Receivers</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Abdullah, Alharith Abdulkareem</creatorcontrib><creatorcontrib>Riza, Mustafa</creatorcontrib><creatorcontrib>Khalaf, Rifaat Zaidan</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Mathematical problems in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abdullah, Alharith Abdulkareem</au><au>Riza, Mustafa</au><au>Khalaf, Rifaat Zaidan</au><au>Chehdi, Kacem</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm</atitle><jtitle>Mathematical problems in engineering</jtitle><date>2015-01-01</date><risdate>2015</risdate><volume>2015</volume><issue>2015</issue><spage>1</spage><epage>6</epage><pages>1-6</pages><issn>1024-123X</issn><eissn>1563-5147</eissn><abstract>A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded plaintext using classical Hill-cipher algorithm. It is shown that the encoded message transferred to the particles called quantum state where we assumed that a photon is used as a qubit and after the encoded message is transferred into photons, the polarization of each photon is rotated by an angle θj, which is chosen randomly for each qubit. The sender and receiver agree over a Hill-cipher key, the encryption occurs by utilization of the quantum three-pass protocol (QTPP), the decryption will be illustrated, and an example shows how the algorithm will work. Finally, the security of this algorithm is analyzed in detail.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2015/481824</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1024-123X
ispartof Mathematical problems in engineering, 2015-01, Vol.2015 (2015), p.1-6
issn 1024-123X
1563-5147
language eng
recordid cdi_proquest_miscellaneous_1677962819
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Wiley Online Library (Open Access Collection); Alma/SFX Local Collection
subjects Algorithms
Authentication
Coding
Communication
Cryptography
Encryption
Mathematical analysis
Mathematical problems
Messages
Photons
Protocol
Qubits (quantum computing)
Receivers
title A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T21%3A11%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Realizable%20Quantum%20Three-Pass%20Protocol%20Authentication%20Based%20on%20Hill-Cipher%20Algorithm&rft.jtitle=Mathematical%20problems%20in%20engineering&rft.au=Abdullah,%20Alharith%20Abdulkareem&rft.date=2015-01-01&rft.volume=2015&rft.issue=2015&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.issn=1024-123X&rft.eissn=1563-5147&rft_id=info:doi/10.1155/2015/481824&rft_dat=%3Cproquest_cross%3E3617729721%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1661307881&rft_id=info:pmid/&rfr_iscdi=true