Some attacks on quantum-based cryptographic protocols

被引:0
|
作者
Lo, HK
Ko, TM
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Ctr Quantum Informat & Quantum Control, Toronto, ON M5S 3G4, Canada
[2] IBM E Fishkill, Dept Phys Synth, Fishkill, NY 12533 USA
关键词
quantum cryptography; quantum key distribution; unconditional security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we give attacks against a recently proposed "secure communication using mesoscopic coherent states", which employs mesoscopic states, rather than single-photon states. Our attacks can be used either as a known-plaintext attack or in the case where the plaintext has not been randomized. One of our attacks requires beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2(kappa) copies of what Bob receives, where kappa is the length of the seed key pre-shared by Alice and Bob. In addition, substantial improvements over such an exhaustive key search attack can be made, whenever a key is reused. Furthermore, we remark that, under the same assumption of a known or non-random plaintext, Grover's exhaustive key search attack can be applied directly to "secure communication using mesoscopic coherent states", whenever the channel loss is more than 50 percent. Therefore, as far as information-theoretic security is concerned, optically amplified signals necessarily degrade the security of the proposed scheme, when the plaintext is known or non-random. Our attacks apply even if the mesoscopic scheme is used only for key generation with a subsequent use of the key for one-time-pad encryption. Studying those attacks can help us to better define the risk models and parameter spaces in which quantum-based cryptographic schemes can operate securely. Finally, we remark that our attacks do not affect standard protocols such as Bennett-Brassard BB84 protocol or Bennett B92 protocol, which rely on single-photon signals.
引用
收藏
页码:41 / 48
页数:8
相关论文
共 50 条
  • [21] QUANTUM-BASED ELECTRONIC DEVICES
    STROSCIO, MA
    SUPERLATTICES AND MICROSTRUCTURES, 1986, 2 (01) : 45 - 47
  • [22] Some applications of polynomials for the design of cryptographic protocols
    Kushilevitz, E
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 1 - 13
  • [23] Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks
    Papadimitriou, Anthonis
    Le Fessant, Fabrice
    Viana, Aline Carneiro
    Sengul, Cigdem
    2009 5TH IEEE WORKSHOP ON SECURE NETWORK PROTOCOLS, 2009, : 43 - +
  • [24] Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks
    Fischlin, Marc
    Mazaheri, Sogol
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 76 - 90
  • [25] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
    Bao, Da
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
  • [26] A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
    Krawec, Walter O.
    2016 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2016, : 2098 - 2105
  • [27] The impact of message losses and retransmissions on quantum cryptographic protocols
    Li Calsi, Davide
    Kohl, Paul
    Choi, JinHyeock
    Noetzel, Janis
    COMPUTER NETWORKS, 2024, 253
  • [28] Research Progress in Semi-Quantum Cryptographic Protocols
    Li, Jian
    Ye, Chongqiang
    Fu, Anqi
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2024, 47 (06): : 18 - 23
  • [29] Quantum-based anonymity and secure veto
    Wang, Qingle
    Li, Yuancheng
    Yu, Chaohang
    Shi, Runhua
    Zhang, Zhichao
    QUANTUM INFORMATION PROCESSING, 2021, 20 (03)
  • [30] Quantum-based anonymity and secure veto
    Qingle Wang
    Yuancheng Li
    Chaohang Yu
    Runhua Shi
    Zhichao Zhang
    Quantum Information Processing, 2021, 20