{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T13:31:59Z","timestamp":1670074319828},"reference-count":30,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.<\/jats:p>","DOI":"10.4018\/ijisp.2019100101","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T14:33:27Z","timestamp":1568385207000},"page":"1-11","source":"Crossref","is-referenced-by-count":3,"title":["A Quantum Secure Entity Authentication Protocol Design for Network Security"],"prefix":"10.4018","volume":"13","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2213-1752","authenticated-orcid":true,"given":"Surjit","family":"Paul","sequence":"first","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"given":"Sanjay","family":"Kumar","sequence":"additional","affiliation":[{"name":"NIT Jamshedpur, Jamshedpur, India"}]},{"given":"Rajiv Ranjan","family":"Suman","sequence":"additional","affiliation":[{"name":"NIT Jamshedpur, Jamshedpur, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019100101-0","doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., & Levkowetz, H. (2004). Extensible authentication protocol (EAP) (No. RFC 3748).","DOI":"10.17487\/rfc3748"},{"key":"IJISP.2019100101-1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2012.4413"},{"key":"IJISP.2019100101-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"IJISP.2019100101-3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"IJISP.2019100101-4","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"IJISP.2019100101-5","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168618"},{"key":"IJISP.2019100101-6","doi-asserted-by":"crossref","unstructured":"Calhoun, P., Loughney, J., Guttman, E., Zorn, G., & Arkko, J. (2003). Diameter base protocol (No. RFC 3588). The Quantum Computer. Retrieved from https:\/\/www.cs.rice.edu\/~taha\/teaching\/05F\/210\/news\/2005_09_16.htm","DOI":"10.17487\/rfc3588"},{"key":"IJISP.2019100101-7","unstructured":"Chait, D., & Mahdy, A. (2008). A Survey of Quantum and Classical Cryptography. Student Paper E-Journal. Retrieved from http:\/\/www.pro-technix.com\/information\/crypto\/pages\/vernam_base.html"},{"key":"IJISP.2019100101-8","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems.","author":"A.Fiat","year":"1986","journal-title":"Proceedings of the Conference on the Theory and Application of Cryptographic Techniques"},{"key":"IJISP.2019100101-9","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"IJISP.2019100101-10","doi-asserted-by":"publisher","DOI":"10.1109\/49.223865"},{"key":"IJISP.2019100101-11","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322514"},{"key":"IJISP.2019100101-12","doi-asserted-by":"publisher","DOI":"10.1002\/sec.506"},{"key":"IJISP.2019100101-13","doi-asserted-by":"publisher","DOI":"10.1145\/242896.242897"},{"key":"IJISP.2019100101-14","doi-asserted-by":"crossref","unstructured":"Kohl, J., & Neuman, C. (1993). The Kerberos network authentication service (V5) (No. RFC 1510).","DOI":"10.17487\/rfc1510"},{"key":"IJISP.2019100101-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.08.003"},{"key":"IJISP.2019100101-16","first-page":"79","article-title":"Open key exchange: How to defeat dictionary attacks without encrypting public keys.","author":"S.Lucks","year":"1997","journal-title":"International Workshop on Security Protocols"},{"key":"IJISP.2019100101-17","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2018010103"},{"key":"IJISP.2019100101-18","author":"A. J.Menezes","year":"2001","journal-title":"Handbook of Applied Cryptography"},{"key":"IJISP.2019100101-19","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"IJISP.2019100101-20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601340"},{"issue":"2","key":"IJISP.2019100101-21","first-page":"1399","article-title":"Comparative Analysis of Various PPP Authentication Protocols.","volume":"5","author":"S.Paul","year":"2017","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"key":"IJISP.2019100101-22","unstructured":"Pecen, M. (2014). Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges, white paper. European Telecommunications Standards Institute."},{"key":"IJISP.2019100101-23","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2018010104"},{"key":"IJISP.2019100101-24","doi-asserted-by":"crossref","unstructured":"Rigney, C., Willens, S., Rubens, A., & Simpson, W. (2000). Remote authentication dial in user service (RADIUS) (No. RFC 2865).","DOI":"10.17487\/rfc2865"},{"key":"IJISP.2019100101-25","doi-asserted-by":"crossref","unstructured":"Simpson, W. (1996). PPP challenge handshake authentication protocol (CHAP) (No. RFC 1994).","DOI":"10.17487\/rfc1994"},{"key":"IJISP.2019100101-26","unstructured":"Simpson, W., & Willens, S. (1997). Remote Authentication Dial In User Service (RADIUS) (No. RFC2138)."},{"key":"IJISP.2019100101-27","doi-asserted-by":"publisher","DOI":"10.1145\/206826.206834"},{"key":"IJISP.2019100101-28","first-page":"97","article-title":"The Secure Remote Password Protocol.","author":"T.Wu","year":"1998","journal-title":"Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium"},{"key":"IJISP.2019100101-29","doi-asserted-by":"crossref","unstructured":"Zorn, G., & Cobb, S. (1998). Microsoft ppp chap extensions (No. RFC 2433).","DOI":"10.17487\/rfc2433"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=237207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T09:58:33Z","timestamp":1651831113000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019100101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}