Browse > Article
http://dx.doi.org/10.7840/kics.2016.41.4.479

Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem  

Park, Hojoong (Kookmin University Department of Financial Information Security)
Bae, Minyoung (Kookmin University Department of Financial Information Security)
Kang, Ju-Sung (Kookmin University Department of Math. / Financial Information Security)
Yeom, Yongjin (Kookmin University Department of Math. / Financial Information Security)
Abstract
For a secure communication system, it is necessary to use secure cryptographic algorithms and keys. Modern cryptographic system generates high entropy encryption key through standard key derivation functions. Using recent progress in quantum key distribution(QKD) based on quantum physics, it is expected that we can enhance the security of modern cryptosystem. In this respect, the study on the dual key agreement is required, which combines quantum and modern cryptography. In this paper, we propose two key derivation functions using dual key agreement based on QKD and RSA cryptographic system. Furthermore, we demonstrate several simulations that estimate entropy of derived key so as to support the design rationale of our key derivation functions.
Keywords
Key derivation function (KDF); Quantum key distribution (QKD); RSA; Dual key agreement; Entropy;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 NIST, Recommendation for Key Derivation Using Pseudorandom Functions, SP 800-108, Oct. 2009.
2 NIST, Recommendation for Password-Based Key Derivation, SP 800-132, Dec. 2010.
3 H. Krawczyk and P. Eronen, Hmac-based extract-and-expand key derivation function (hkdf), RFC 5869 (Proposed Standard), May 2010.
4 ID Quantique, KEY SERVER, Retrieved Mar., 26 from http://swissquantum.idquantique.com/?Key-Server#Parallel_Key_Agreements.
5 ID Quantique, CERBERIS, from http://www.idquantique.com/wordpress/wp-content/uploads/Cerberis-Datasheet.pdf.
6 R. Sarath and A. Shajin Narguman, "Key distribution using dual channel technique for ultimate security," Indian J. Sci. and Technol., vol. 8, no. 26, 2015.
7 A. Odeh, K. Elleithy, M. Alshowkan, and E. Abdelfattah, "Quantum key distribution by using public key algorithm(RSA)," IEEE INTECH 2013, pp. 83-86, London, UK, Aug. 2013.
8 ISO/IEC, Information technology-Security technique-Encryption algorithms-Part 2: Asymmetric ciphers, ISO/IEC 18033-2, May 2006.
9 NIST, Recommendation for Key Derivation through Extraction-then-expansion, SP 800-56C, Nov. 2011.
10 NIST, Recommendation for Pair-Wise key establishment schemes using integer factorization cryptography, SP 800-56B, Sept. 2014.
11 Y. S. Kim, "Group key transfer protocol based on shamir's secret sharing," J. KICS, vol. 39B no. 9, pp. 555-560, 2014.   DOI
12 NIST, Recommendation for the entropy sources used for random bit generation, SP 800-90B, Aug. 2012.
13 T. Matthias and R. Renner, A randomness extractor for the Quantis device, vol. 31. Id Quantique Technical Report, 2012.
14 B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak, F. Standaert, and Y. Yu, Leftover hash lemma, revisited, Sept. 2011.
15 G. V. Assche, Quantum cryptography and secret-key Distillation, CAMBRIDGE, 2012.
16 S. Im, H. Jeon, and J. Ha, "A novel distributed secret key extraction technique for wireless network," J. KICS, vol. 39A, no. 12, pp. 708-717, 2014.   DOI
17 K. J. Ha, C. H. Seo, and D. Y. Kim, "Design of validation system for a crypto-algorithm implementation," J. KICS, vol. 39B no. 04, pp. 242-250, 2014.   DOI
18 Whitewood, Whitewood Entropy Engine, Retrieved Jan., 23 from http://www.whitewoodencryption.com/wp-content/uploads/2015/08/Whitewood_EE.pdf.
19 NIST, Secure Hash Standard(SHS), FIPS 180-4, Aug. 2015.
20 TTA, Key Derivation Functions Using ARIA/SEED, TTAK.KO-12.0241, Jul. 2014.
21 NIST, Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program, Jan. 2016.
22 H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf. 2016, Jeongseon, Korea, Jan. 2016.
23 G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, The KECCAK sponge function family, Retrieved Jan., 25 from http://keccak.noekeon.org.