E
σ
′
X,Y
(R) ⊕ σ
′′
X,Y
to the package as encrypted rout-
ing information. The function E
σ
denotes any sym-
metric cipher with a strong avalanche effect (Webster
and Tavares, 1986).
It follows that E
σ
′
X,Y
(R) provides no information
for encrypting another (forged) R
′
6= R and the one-
time pad encryption with σ
′′
X,Y
prevents exhaustive
searching for the key σ
′
X,Y
or σ
′′
X,Y
. Since Eve is
required to modify R to R
′
6= R , the avalanche
effect will ”randomize” the ciphertext, so knowing
E
σ
′
X,Y
(R) is worthless for creating E
σ
′
X,Y
(R
′
).
Avoiding Impersonation: We can use the QKD
established secrets to implement perfectly secure au-
thentication by exchanging portions of the QKD-key
with an unconditionally secure MAC (see (Stinson,
1992)) attached to it. This MAC is based on a key,
exclusively shared by Alice and Bob. If there is no
adversary, then the MAC should correctly be veri-
fied. However if there is an adversary in the middle,
then with high probability, s/he must have established
two distinct QKD-keys with Alice and Bob, and thus
will be detected upon failure of the verification of the
MAC. Moreover, forging the MAC is not effectively
possible, as it is unconditionally secure. This idea is
elaborated in full detail in (Rass, 2005b).
4 CONCLUSION
Upon the work of (Ghernaouti-H
´
elie et al., 2005) and
(Ghernaouti-H
´
elie and Sfaxi, 2005) we have built a
framework for delivering messages over networks in
which adjacent nodes are able to establish secrets by
means of quantum cryptography. We fulfil the re-
quirements of classical information-theoretically se-
cure schemes and provide practical solutions for net-
work design and message relay. To the best of our
knowledge, this is the first unified approach to im-
plementing QKD in existing protocols and network
infrastructure, providing provable security at reason-
able effort.
REFERENCES
Awerbuch, B., Holmer, D., and Rubens, H. (2003).
Provably secure competitive routing against proac-
tive byzantine adversaries via reinforcement learning.
Technical Report 2, Department of Computer Science
at Johns Hopkins University, Baltimore, MD.
Awerbuch, B., Holmer, D., and Rubens, H. (2004). Swarm
intelligence routing resilient to byzantine adversaries.
Bennet, C. and Brassard, G. (1984). Public key distribution
and coin tossing. In IEEE International Conference
on Computers, Systems, and Signal Processing., LOS
ALAMITOS. IEEE Press.
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and
Wallach, D. S. (2002). Secure routing for structured
peer-to-peer overlay networks. SIGOPS Oper. Syst.
Rev., 36(SI):299–314.
Chartrand, G. (2005). Introduction to graph theory. Higher
education. McGraw-Hill, Boston.
Elliott, C. (2002). Building the quantum network. New
Journal of Physics, (4 (46.1-46.12)).
Elliott, C., Pearson, D., and Troxel, G. (2003). Quantum
cryptography in practice.
Gabow, H. N. (2000). Using expander graphs to find ver-
tex connectivity. In FOCS ’00: Proc. of the 41st An-
nual Symposium on Foundations of Computer Sci-
ence, page 410, Washington, DC, USA. IEEE Com-
puter Society.
Ghernaouti-H
´
elie, S. and Sfaxi, M. A. (2005). Upgrading
PPP security by quantum key distribution. In NetCon
2005 conference.
Ghernaouti-H
´
elie, S., Sfaxi, M. A., Ribordy, G., and Gay,
O. (2005). Using quantum key distribution within
IPSEC to secure MAN communications. In MAN
2005 conference.
Hu, Y.-C., Perrig, A., and Johnson, D. B. (2002). Ari-
adne: A secure on-demand routing protocol for ad hoc
networks. In Proc. of the 8th Annual International
Conference on Mobile Computing and Networking
(MobiCom 2002), pages 12–23.
Rass, S. (2005a). How to send messages over quantum
networks in an unconditionally secure manner. Tech-
nical Report TR-syssec-05-05, University of Klagen-
furt, Computer Science, System Security, Klagenfurt.
Rass, S. (2005b). On information-theoretically secure au-
thentication in quantum networks. Technical Report
TR-syssec-05-07, University of Klagenfurt, Computer
Science, System Security, Klagenfurt.
Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., and
Belding-Royer, E. M. (2002). A secure routing pro-
tocol for ad hoc networks. In ICNP ’02: Proc. of
the 10th IEEE International Conference on Network
Protocols, pages 78–89, Washington, DC, USA. IEEE
Computer Society.
Shamir, A. (1979). How to share a secret. Commun. ACM,
22(11):612–613.
Stinson, D. R. (1992). Universal hashing and authenti-
cation codes. In CRYPTO ’91: Proc. of the 11th
Annual International Cryptology Conference on Ad-
vances in Cryptology, pages 74–85, London, UK.
Springer-Verlag.
Webster, A. and Tavares, S. (1986). On the design of S-
boxes. In Lecture notes in computer sciences; 218
on Advances in cryptology—CRYPTO 85, pages 523–
534, New York, NY, USA. Springer-Verlag New York,
Inc.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
210