Bello A. Buhari

Work place: Usmanu Danfodiyo University/Department of Mathematics, Sokoto, 234, Nigeria

E-mail: buhari.bello@udusok.edu.ng

Website:

Research Interests: Data Structures and Algorithms, World Wide Web, Network Security, Information Security, Software Engineering, Engineering

Biography

Bello A. Buhari, Obtained B.Sc. in Computer Science at Usmanu Danfodiyo University Sokoto – Nigeria and M.Sc. in Computer Science at Ahmadu Bello University Zaria – Nigeria. He is now pursuing Ph.D. in Computer Science at Usmanu Danfodiyo University Sokoto – Nigeria. He is a Lecture in the Department of Mathematics, Computer Science Unit, Usmanu Danfodiyo University Sokoto – Nigeria since 2004. His research interest include: Software Engineering, Web Security and Cryptography

Author Articles
Enhancement of S13 Quantum Key Distribution Protocol by Employing Polarization, Secrete Key Disclosure and Non-repudiation

By Bello A. Buhari Afolayan Ayodele Obiniyi Sahalu B. Jubaidu Armand F. Donfack Kana

DOI: https://doi.org/10.5815/ijwmt.2023.04.03, Pub. Date: 8 Aug. 2023

Quantum cryptography is the most convenient resolution for information security systems that presents an ultimate approach for key distribution. Today, the most viable key distribution resolutions for information security systems are those based on quantum cryptography. It is based on the quantum rules of physics rather than the assumed computational complexity of mathematical problems. But, the initial BB84 quantum key distribution protocol which is the raw key exchange of S13 quantum key distribution protocol has weakness of disclosure of large portion of secrete key or eavesdropping. Also, it cannot make use of most of the generated random bit. This paper enhanced S13 quantum key distribution protocol by employing polarization, secrete key disclosure and non-repudiation. The use of biometric or MAC address ensures non-repudiation. The row key exchange part of the S13 quantum key distribution which is the same as BB84 is enhanced by employing polarization techniques to make use of most of the generated random bit. Then, the tentative final key generated at the end of error estimation phase should be divided into blocks, padding, inverting the last bit of each block and XORing the block to generate a totally different key from the tentative one. Also, the random bits will be from biometric or serve MAC address respectively. The enhanced S13 quantum key is evaluated using cryptanalysis which shows that the enhanced protocol ensures disclosures of large portion of secrete key to prevent eavesdropping, utilization of most of the chosen binary strings to generate strong key and safeguarding against impersonation attack.

[...] Read more.
Design of a Virtual Area Network for National Open University Sokoto Study Center

By Bello A. Buhari Zaharaddeen M. Bello Sirajo Shehu

DOI: https://doi.org/10.5815/ijwmt.2020.01.03, Pub. Date: 8 Feb. 2020

Nowadays, there is a need for an efficient and effective way in which computers are interconnected. In National Open University Sokoto Study Center network there exist problems such as: more traffic which may slower the network performance, bandwidth wastage and security problems because the host and servers that are connected to Layer 2 switch are part of the same network segment. To resolve these problems we identify the networking media that best suits the network to enable person-to-person communication, determine the best network architecture that would enable effective resource sharing between all staff offices, design respective VLANs for different units, configure network addresses for each units and identify configurations required on router and switches to create VLAN’s and Inter VLANrouting. After the implementation of proposed Virtual Local Area Network in ICT unit of National Open University Sokoto study center, effective resource sharing and communication is achieved. Hence, implementation of this study is practically cost effective.

[...] Read more.
Other Articles