Loading [MathJax]/extensions/MathMenu.js
Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution | IEEE Conference Publication | IEEE Xplore

Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution


Abstract:

While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a manin-the-middle attack. This paper examines how the man-...Show More

Abstract:

While the use of Quantum Key Distribution is very secure, some faults can occur, specifically, that can create a manin-the-middle attack. This paper examines how the man-in-the-middle attack can occur and why Quantum Key Distribution is still the superior encryption choice. Applying Post-Quantum Cryptography (FALCON Algorithm) to the Quantum Key Distribution should create more secure encryption to mitigate a man-in-the-middle attack, thusly protecting the communication from the eavesdropper.
Date of Conference: 05-05 May 2023
Date Added to IEEE Xplore: 14 July 2023
ISBN Information:
Conference Location: Old Westbury, NY, USA

Contact IEEE to Subscribe

References

References is not available for this document.