All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Authentication in virtual private networks based on quantum key distribution methods

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F16%3A86100031" target="_blank" >RIV/61989100:27240/16:86100031 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/article/10.1007/s11042-014-2299-1" target="_blank" >http://link.springer.com/article/10.1007/s11042-014-2299-1</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/s11042-014-2299-1" target="_blank" >10.1007/s11042-014-2299-1</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Authentication in virtual private networks based on quantum key distribution methods

  • Original language description

    Quantum physics has a major influence on modern computer science and communications. New quantum-based solutions continue to be proposed by researchers. However, only a few techniques are possible to implement in practice. One of them is quantum key distribution, which ensures the confidentiality of digital data. This article introduces a new concept: quantum distribution of pre-shared keys. This approach provides end-users with very secure authentication, impossible to achieve using currently-available techniques. Secure authentication is a key requirement in virtual private networks (VPN) - popular protection in computer networks. The authors simulated quantum-based distribution of a shared secret in a typical VPN connection. Using a dedicated simulator, all individual steps of the quantum key distribution process were presented. Based on the created secret, a secure IPsec tunnel in a StrongSwan environment was established between AGH (Poland) and VSB (Czech Republic). It allows end-users to communicate at very high security levels.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    V - Vyzkumna aktivita podporovana z jinych verejnych zdroju

Others

  • Publication year

    2016

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Multimedia Tools and Applications

  • ISSN

    1380-7501

  • e-ISSN

  • Volume of the periodical

    75

  • Issue of the periodical within the volume

    17

  • Country of publishing house

    NL - THE KINGDOM OF THE NETHERLANDS

  • Number of pages

    17

  • Pages from-to

    10691-10707

  • UT code for WoS article

    000382678800029

  • EID of the result in the Scopus database

    2-s2.0-84907897791