Some attacks on quantum-based cryptographic protocols

被引:0
|
作者
Lo, HK
Ko, TM
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Ctr Quantum Informat & Quantum Control, Toronto, ON M5S 3G4, Canada
[2] IBM E Fishkill, Dept Phys Synth, Fishkill, NY 12533 USA
关键词
quantum cryptography; quantum key distribution; unconditional security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we give attacks against a recently proposed "secure communication using mesoscopic coherent states", which employs mesoscopic states, rather than single-photon states. Our attacks can be used either as a known-plaintext attack or in the case where the plaintext has not been randomized. One of our attacks requires beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2(kappa) copies of what Bob receives, where kappa is the length of the seed key pre-shared by Alice and Bob. In addition, substantial improvements over such an exhaustive key search attack can be made, whenever a key is reused. Furthermore, we remark that, under the same assumption of a known or non-random plaintext, Grover's exhaustive key search attack can be applied directly to "secure communication using mesoscopic coherent states", whenever the channel loss is more than 50 percent. Therefore, as far as information-theoretic security is concerned, optically amplified signals necessarily degrade the security of the proposed scheme, when the plaintext is known or non-random. Our attacks apply even if the mesoscopic scheme is used only for key generation with a subsequent use of the key for one-time-pad encryption. Studying those attacks can help us to better define the risk models and parameter spaces in which quantum-based cryptographic schemes can operate securely. Finally, we remark that our attacks do not affect standard protocols such as Bennett-Brassard BB84 protocol or Bennett B92 protocol, which rely on single-photon signals.
引用
收藏
页码:41 / 48
页数:8
相关论文
共 50 条
  • [1] On the security of αη: Response to 'some attacks on quantum-based cryptographic protocols'
    Yuen, Horace P.
    Nair, Ranjith
    Corndorf, Eric
    Kanter, Gregory S.
    Kumar, Prem
    Quantum Information and Computation, 2006, 6 (07): : 561 - 582
  • [2] On the security of αη:: Response to 'some attacks on quantum-based cryptographic protocols'
    Yuen, Horace P.
    Nair, Ranjith
    Corndorf, Eric
    Kanter, Gregory S.
    Kumar, Prem
    QUANTUM INFORMATION & COMPUTATION, 2006, 6 (07) : 561 - 582
  • [3] Quantum Communication Attacks on Classical Cryptographic Protocols
    Damgard, Ivan
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 181 - 181
  • [4] Quantum communication attacks on classical cryptographic protocols: (invited talk)
    Damgård, Ivan
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6673 LNCS
  • [5] Superposition Attacks on Cryptographic Protocols
    Damgard, Ivan
    Funder, Jakob
    Nielsen, Jesper Buus
    Salvail, Louis
    INFORMATION THEORETIC SECURITY, ICITS 2013, 2014, 8317 : 142 - 161
  • [6] Synthesising attacks on cryptographic protocols
    Sinclair, D
    Gray, D
    Hamilton, G
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2004, 3299 : 49 - 63
  • [7] An approach to finding the attacks on the cryptographic protocols
    Sun, Yongxing
    Wang, Xinmei
    Operating Systems Review (ACM), 2000, 34 (03): : 19 - 28
  • [8] Reconstruction of attacks against cryptographic protocols
    Allamigeon, X
    Blanchet, B
    18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, : 140 - 154
  • [9] ASAP: Algorithm Substitution Attacks on Cryptographic Protocols
    Berndt, Sebastian
    Wichelmann, Jan
    Pott, Claudius
    Traving, Tim-Henrik
    Eisenbarth, Thomas
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 712 - 726
  • [10] A SAT-Based Planning Approach for Finding Logical Attacks on Cryptographic Protocols
    Aribi, Noureddine
    Lebbah, Yahia
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 1 - 21