Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Logan O. Mailloux is active.

Publication


Featured researches published by Logan O. Mailloux.


ieee symposium on security and privacy | 2015

Performance Evaluations of Quantum Key Distribution System Architectures

Logan O. Mailloux; Michael R. Grimaila; Douglas D. Hodson; Gerald Baumgartner; Colin V. McLaughlin

Quantum key distribution (QKD) exploits the laws of quantum physics to generate shared secret cryptographic keys and can detect eavesdroppers during the key generation process. However, previous QKD research has focused more on theory than practice.


IEEE Access | 2015

A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities

Logan O. Mailloux; Jeffrey D. Morris; Michael R. Grimaila; Douglas D. Hodson; David R. Jacques; John M. Colombi; Colin V. McLaughlin; Jennifer A. Holes

Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical representations. In this paper, we introduce a modeling framework built upon the OMNeT++ discrete event simulation framework to study the impact of implementation nonidealities on QKD system performance and security. Specifically, we demonstrate the capability to study the device imperfections and practical engineering limitations through the modeling and simulation of a polarization-based, prepare and measure BB84 QKD reference architecture. The reference architecture allows users to model and study complex interactions between physical phenomenon and system-level behaviors representative of real-world design and implementation tradeoffs. Our results demonstrate the flexibility of the framework to simulate and evaluate current, future, and notional QKD protocols and components.


The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology | 2015

Modeling decoy state Quantum Key Distribution systems

Logan O. Mailloux; Ryan D. L. Engle; Michael R. Grimaila; Douglas D. Hodson; John M. Colombi; C V McLaughlin

Quantum Key Distribution (QKD) is an innovative technology which exploits the laws of quantum physics to generate and distribute shared secret key for use in cryptographic devices. Quantum Key Distribution offers the advantage of ‘unconditionally secure’ key generation with the unique ability to detect eavesdropping on the key distribution channel and shows promise for high-security applications such as those found in banking, government, and military environments. However, Quantum Key Distribution is a nascent technology where realized systems suffer from implementation non-idealities, which may significantly impact system performance and security. In this article, we discuss the modeling of a decoy state enabled Quantum Key Distribution system built to study the impact of these practical limitations. Specifically, we present a thorough background on the decoy state protocol, detailed discussion of the modeled decoy state enabled Quantum Key Distribution system, and evidence for component and sub-system verification, as well as, multiple examples of system-level validation. Additionally, we bring attention to practical considerations associated with implementing the decoy state protocol security condition gained from these research activities.


IEEE Communications Magazine | 2015

Quantum key distribution: examination of the decoy state protocol

Logan O. Mailloux; Michael R. Grimaila; John M. Colombi; Douglas D. Hodson; Ryan D. L. Engle; Colin V. McLaughlin; Gerald Baumgartner

Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute a shared cryptographic key for secure communications. The unique nature of QKD ensures that eavesdropping on quantum communications necessarily introduces detectable errors which is desirable for high-security environments. QKD systems have been demonstrated in both freespace and optical fiber configurations, gaining global interest from national laboratories, commercial entities, and the U.S. Department of Defense. However, QKD is a nascent technology where realized systems are constructed from non-ideal components, which can significantly impact system performance and security. In this article, we describe QKD technology as part of a secure communications solution and identify vulnerabilities associated with practical network architectures. In particular, we examine the performance of decoy state enabled QKD systems against a modeled photon number splitting attack and suggest an improvement to the decoy state protocol security condition that does not assume a priori knowledge of the QKD channel efficiency.


IEEE Access | 2016

Using Modeling and Simulation to Study Photon Number Splitting Attacks

Logan O. Mailloux; Douglas D. Hodson; Michael R. Grimaila; Ryan D. L. Engle; Colin V. McLaughlin; Gerald Baumgartner

Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key distribution channel necessarily introduces detectable errors and shows promise for high-security environments, such as banking, government, and military. However, QKD systems are vulnerable to advanced theoretical and experimental attacks. In this paper, the photon number splitting (PNS) attack is studied in a specialized QKD modeling and simulation framework. First, a detailed treatment of the PNS attack is provided with emphasis on practical considerations, such as performance limitations and realistic sources of error. Second, ideal and non-ideal variations of the PNS attack are studied to measure the eavesdroppers information gain on the QKD-generated secret key bits and examine the detectability of PNS attacks with respect to both quantum bit error rate and the decoy state protocol. Finally, this paper provides a repeatable methodology for efficiently studying advanced attacks, both realized and notional, against QKD systems and more generally quantum communication protocols.


ieee symposium on security and privacy | 2016

Putting the "Systems" in Security Engineering: An Examination of NIST Special Publication 800-160

Logan O. Mailloux; Michael McEvilley; Stephen Khou; John M. Pecarina

Security professionals should be familiar with ongoing developments in the systems security engineering field, specifically the second public release of National Institute of Standards and Technology (NIST) Special Publication 800-160 Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. NIST SP 800-160 provides a systems-oriented approach to engineering secure systems in what is perhaps the most significant work in the specialty domains history.


It Professional | 2016

Post-Quantum Cryptography: What Advancements in Quantum Computing Mean for IT Professionals

Logan O. Mailloux; Charlton D. Lewis; Casey Riggs; Michael R. Grimaila

The impact of quantum computing is a topic of increasing importance to IT practitioners. Thus, the authors present a readily understandable introduction and discussion of post-quantum cryptography, including quantum-resistant algorithms and quantum key distribution.


Digital Investigation | 2016

Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver

Christopher W. Badenhop; Benjamin W. P. Ramsey; Barry E. Mullins; Logan O. Mailloux

Z-Wave is an implementation of home automation, under the broad category of Internet of Things (IoT). To date, the ability to perform forensic investigations on Z-Wave devices has largely been ignored; however, the placement of these devices in homes and industrial facilities makes them valuable assets for the investigation of criminal and adversarial actors. Z-Wave devices consist of sensors and actuators, which can be connected to the Internet via a gateway. Therefore, their memory contents may contain sensor reports of criminal activity or, more indirectly, provide evidence that the devices have been manipulated to achieve physical or cyber access. This paper provides details on extracting and programming the Flash and EEPROM memory of the ZW0301, which is a common Z-Wave transceiver module found on many Z-Wave devices. Specifically, the memory usage is characterized and several artifacts are identified. The feasibility of conducting a firmware modification attack on the ZW0301 is also explored. The results of this work identify several data structures including the node protocol information table and node adjacency table. The compiler and coding language used for the firmware image are also fingerprinted.


The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology | 2017

Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model

Ryan D. L. Engle; Logan O. Mailloux; Michael R. Grimaila; Douglas D. Hodson; Colin V. McLaughlin; Gerald Baumgartner

Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems.


IEEE Potentials | 2017

The Benefits of Joining a Multidisciplinary Research Team

Logan O. Mailloux; Michael R. Grimaila; Douglas D. Hodson; Gerald Baumgartner

Exciting research challenges often present themselves as complex problems-they are inherently difficult to understand and require multiple domains of expertise to solve. As a result, teamwork is becoming the everyday norm in most professional settings and is often required when studying topical problems (e.g., autonomous vehicles, cyberphysical, renewable energy, among others). For students, learning to operate within, and eventually lead, a team is a necessary and valuable skill that will benefit them throughout their professional lives.

Collaboration


Dive into the Logan O. Mailloux's collaboration.

Top Co-Authors

Avatar

Michael R. Grimaila

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Douglas D. Hodson

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Colin V. McLaughlin

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Ryan D. L. Engle

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

John M. Colombi

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Stephen Khou

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

John M. Pecarina

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Barry E. Mullins

Air Force Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge