model has been done in C++. We use Simulink S-
-Functions to implement and simulate the results.
The main functionalities of each of the four
phases of QKD have been identified in programming
point of view as below:
Sifting: Construct a buffer containing the bit stream
once the photon transmission is finished, Supplicant
to inform the bases it used, Authenticator to
reconstruct its buffer contents that matches the bases
received from Supplicant.
Error Estimation: Supplicant to send a set of sample
bits from its key, Authenticator to compare those
bits and calculate the error rate, Authenticator to
decide if the error rate is acceptable or not (based on
the threshold level), Inform Supplicant about the
decision, Proceed to next phase if the error rate is
acceptable, reattempt photon transmission otherwise.
Reconciliation (Assuming “parity check” is used as
the reconciliation method): Split the key into blocks,
compare parity of each block, Split those blocks
whose parity is mismatched, Perform parity check
on those sub blocks until the error is found,
Continue till all the errors are located and
eliminated.
Privacy Amplification: Apply pre-defined hash
function to the remaining key to eliminate possible
leak of bits to outsiders.
For each phase, these functionalities have been
implemented using C++ as several subsystems.
During each phase, the communication is carried out
between respective peer sessions of Authenticator
and Supplicant.
During Sifting, Error Estimation and Privacy
Amplification phases of QKD, the new protocol
consumes fewer resources as it only needs few
comparisons to be done. Bulk of the processing
happens during Reconciliation phase. It needs few
additional communication flows to obtain the final
secured key. The number of additional steps depends
on the type of reconciliation method such as
CASCADE (Gilles B et al, 1994), WINNOW
(Buttler W.T., 2003) etc, used.
In addition, we shall save several key refresh
cycles that happens during existing IEEE 802.11
communication. In this new protocol, key refreshing
is not required as the key obtained via QKD is
proven to be unconditionally secure.
5.2 Analysis of QKD Solution for Key
Exchange
In addition to the unconditional security achieved,
the simulation analysis of QKD approach shows
several other advantages. Main area of modifications
applied to the existing protocol is the 4-way hand
shake process. The first stage of QKD (sifting) only
requires single EAPOL communication flow
involving STA informing AP about the bases it used.
Results show that there is no significant amount of
processing needed as opposed to the nonce value
calculations involved in the existing protocol.
The second stage of QKD process (error
estimation) is implemented by two EAPOL
communication flows. The first flow is to transmit
bit sample while the second to inform the result. In
this step too results shows that both STA and AP
consume only small amount of processing power. At
AP side it only performs simple bit comparison on a
bit stream of small length.
The third stage (Reconciliation) is the stage
where majority of processing takes place. The
number of communication flows happen in this stage
is depending on the reconciliation protocol used. We
have implemented the parity check method. Parity
check method involves more computations when
compared to other existing reconciliation protocols
such as Cascade or Winnow. Our choice of parity
check method is to see the results in the worst case
scenario.
The final stage of QKD (privacy amplification)
involves just a single EAPOL frame, which does not
requires much processing power at either end.
When compared to the existing protocol, it could
be seen that only the reconciliation process is taking
few additional EAOPL flows. However, the key
exchanged in the existing protocol needs to be
refreshed at regular intervals to maintain security of
data encryption. But in the QKD based protocol,
such key refresh cycles are not needed as the key
exchanged provide unconditional security. Hence
with this new protocol significant amount of
processing time could be saved. Overall, this can
compensate to the extra cycles of flows taken during
the reconciliation process.
6 CONCLUSIONS
In this work, the changes to accommodate QKD
have been done with extreme care so that it will
have minimum impact to the existing IEEE 802.11
protocol. The main advantage of this protocol
modification is that no major frame level changes
are needed. QKD modifications use fields of the
existing frames. Both Supplicant and Authenticator
are able to identify if they can implement QKD for
key exchange at the early stages (by listening to
ICSOFT 2010 - 5th International Conference on Software and Data Technologies
150