Time filter

Source Type

Elboukhari M.,University Mohammed Premier | Azizi A.,University Mohammed Premier | Azizi A.,Academy Hassan II of science and Technology | Azizi M.,University Mohamed Ist Oujda
2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010 | Year: 2010

Extensive studies have been undertaken on quantum cryptography, which offers unconditionally secure communication based on quantum mechanics, since it was noted that quantum computers could break public key cryptosystems based on number theory. Now there is a strong need of research to exploit this technology in the existing communication networks. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. There are a large variety of kinds of mobile wireless networks, Wi-Fi, based on the IEEE 802.11 standard, is wireless local area network and due to the limited coverage area, this environment potentially offers a chance to let quantum key distribution (QKD) play a role in the wireless communication. In this paper, we propose a technique of integrating quantum cryptography in 802.11 to provide a secure service of authentication. It is based on integrating QKD in the EAP-TLS conversation to enhance the security of the authentication process. © 2010 IEEE.


Chanigui E.-S.,University Mohammed Premier | Azizi A.,Academy Hassan II of science and Technology
Journal of Computer Science | Year: 2015

This study provides a simple variation of the protocol of quantum key expansion proposed by Hwang. Some weaknesses relating to the step of public discussions for error detection are analyzed and an attack strategy, allowing the eavesdropper to get partial information about the used bases, is put forward. Using the One-Time Pad cipher, we propose a possible scheme which is secure against the presented attack. © 2015 The Es-Said Chanigui and Abdelmalek Azizi.


Elboukhari M.,University Mohammed Premier | Azizi A.,University Mohammed Premier | Azizi A.,Academy Hassan II of science and Technology | Azizi M.,University Mohammed Premier
2010 5th International Symposium on I/V Communications and Mobile Networks, ISIVC 2010 | Year: 2010

Since it was noted that quantum computers could break public key cryptosystems based on number theory, extensive studies have been undertaken on Quantum Key Distribution (QKD). QKD or Quantum Cryptography solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of physics. Actually, the progress of research in this field allows the implementation of Quantum Cryptography outside of laboratories. Efforts are made to exploit this technology in the existing communication networks and to improve the performance and reliability of the implemented technologies. The cryptosystems based on QKD are very promising and also the technology is improving more and more to fulfill requirements. In this paper, we provide a state-of-the-art of practical Quantum Cryptography by exposing the popular works and projects on QKD implementation. © 2010 IEEE.


Elboukhari M.,University Mohammed Premier | Azizi M.,University Mohammed Premier | Azizi A.,Academy Hassan II of science and Technology
Studies in Computational Intelligence | Year: 2010

Quantum Cryptography or Quantum key distribution (QKD) is new method that allows the secure distribution of a bit string, used as key in cryptographic protocols. Extensive researches have been undertaken on Quantum Cryptography since it was noted that quantum computers could break public key cryptosystems based on number theory. Quantum Cryptography offers unconditionally secure communication based on laws of quantum physics. Actually, there is a strong need of research to use this technology in the existing communication networks. We explore in this paper, the possibility of exploiting QKD in the authentication process for local area networks (LANs). Precisely, we have elaborated a scheme to integrate the new technique of QKD in the CHAP protocol (Challenge Handshake Authentication Protocol) to enhance the security of the authentication service. © 2010 Springer-Verlag Berlin Heidelberg.


Meddad M.,CNRS Laboratory of Electrical Engineering and Ferroelectricity | Meddad M.,Ferhat Abbas University Setif | Eddiai A.,CNRS Laboratory of Electrical Engineering and Ferroelectricity | Hajjaji A.,Chouaïb Doukkali University | And 4 more authors.
Synthetic Metals | Year: 2014

The harvesting of energy from ambient environments is an emerging technology with potential for numerous applications, including portable electronic devices for renewable energy. Most of the current research activities refer to classical piezoelectric ceramic materials but more recently the development of electrostrictive polymers has generated novel opportunities for high-strain actuators. At present, the investigation of using electrostrictive polymers for energy harvesting (a conversion of mechanical to electrical energy) is beginning to show potential for this application. Basically, the relative energy gain depends on the current induced by the mechanical strain and frequency. The aim of this work was to determine the optimum operating range for improved electro-mechanical conversion efficiency of electrostrictive polymer composite by the effect of mechanical parameters (mechanical frequency and the amplitude strain) that leads to an increase in the generated current and improve the output power in relation to the injected power. It was also found that the trend of the experimental data is in good accordance with that of the theoretical prediction. Finally, the results indicated that the frequency and the amplitude of mechanical excitation were the critical parameters for the best electromechanical conversion. © 2013 Elsevier B.V.


Sbiaai K.,Chouaïb Doukkali University | Boughaleb Y.,Chouaïb Doukkali University | Boughaleb Y.,Academy Hassan II of science and Technology | Boughaleb Y.,Hassan II University | And 3 more authors.
Thin Solid Films | Year: 2013

In this paper we investigated the diffusion of Ag adatom by computing the energy barriers for many elementary diffusive processes which are likely to happen near to the step edge on Cu (110). The barriers are calculated by means of molecular dynamics simulation by using embedded atom potentials. The proximity to steps alters these barriers considerably, and very different results may be expected. In fact, our numerical calculations show that the diffusion via jump process along step edge is predominant for Ag/Cu(110) and the diffusion over the step occurs sometimes, but only via exchange mechanisms. The adatom diffusion across channels is difficult due to the high value of activation energy required (around 1 eV). Furthermore, we found the Ehrlich-Schwoebel barrier for diffusion around 120 meV in order to descend via exchange process and of the order of 170 meV via hopping mode. This aspect may have a strong influence on the growth character. In general our results suggest that, for our metal system, diffusion mechanism may be important for mass transport across the steps. Implications of these findings are discussed. © 2013 Elsevier B.V. All rights reserved.

Loading Academy Hassan II of science and Technology collaborators
Loading Academy Hassan II of science and Technology collaborators