A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and intercepti
- PDF / 6,197,359 Bytes
- 19 Pages / 595.224 x 790.955 pts Page_size
- 21 Downloads / 149 Views
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks Amir Hassani Karbasi1 · Siyamak Shahpasand2 Received: 4 March 2019 / Accepted: 28 February 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Ethereum is a public, open-source, decentralized, and peer-to-peer blockchain-based computing network which is involving to the usefulness of smart contract. It gives a distributed Turing-complete virtual machine in which some codes can be executed by utilizing a worldwide and public network of nodes. The compelled certificate creation and Man-In-The-Middle (MITM) attacks are two major attacks on End-to-End Encryption (EEE) and SSL/TLS. A portion of the real attacks on endto-end encryption and SSL/TLS is IP/ARP poisoning and the phishing attack. MITM attack makes the client difficult to understand, whether they are associated with a unique verified and secured connection or not. Since the certificate and publickey that is being passed during the connection setup is unreliable and insecure, the attacker can undoubtedly change the data in the certificate and leaves the endorsement of the certificate and public-key to the client. The purpose of this paper is to present a solution of providing the legitimacy and authenticity of freely shared and published online digital data, e.g., digital certificates, cryptographic keys, and common reference strings such as shared passwords using a mix of recently developed innovations which primary include blockchain, smart contract, InterPlanetary File System (IPFS), and quantum-resistant Password-based Authenticated Key Exchange (PAKE) protocol over rings and ideal lattices. Ethereum smart contract is utilized to manage, surveil, and give detectability and visibility into the history of digital data from its beginning to the most recent variant, in a way that it is decentralized and internationally accessed with high integrity, resiliency, and transparency, that we should thank to the immutability and irreversibility of the blockchain. The full code of our smart contract is given, with a discourse on the execution and testing of its key functionalities. Keywords Blockchain · Decentralized app (DApp) · IPFS · Lattice-based key exchange · MITM attacks · Privacy · Smart contract
1 Introduction Nowadays, the amount of data transmitted electronically over the web and network has continued with a quick
Amir Hassani Karbasi
[email protected] Siyamak Shahpasand shahpasand [email protected] 1
Department of Computer Science, Khazar University, Baku, Azerbaijan
2
Department of Computer Engineering, University of Tabriz, Tabriz, Iran
development over the past years, and it is anticipated to grow much more forcefully. Essential communications, similar to business deals, monetary exchanges, restorative records, private material, cryptographic keys (certificates), and so forth depend upon a safe and confirmed channel. In the wake of understanding the pervasiveness of network
Data Loading...