Development of Quantum Protocol Modification CSLOE-2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84

被引:1
作者
Cherckesova, Larissa, V [1 ]
Safaryan, Olga A. [1 ]
Beskopylny, Alexey N. [2 ]
Revyakina, Elena [1 ]
机构
[1] Don State Tech Univ, Dept Cyber Secur Informat Syst, Rostov On On 344003, Russia
[2] Don State Tech Univ, Dept Transport Syst, Fac Rd & Transport Syst, Rostov Na Donu 344003, Russia
关键词
quantum protocol; quantum cryptography; quantum key distribution; error threshold; modification of the quantum protocol BB84; TELEPORTATION; INFORMATION; SECURITY;
D O I
10.3390/electronics11233954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum cryptography protocols make it possible not only to ensure the protection of data transmitted in a communication channel from unauthorized access by intruders, but also to detect the existence of any attempted interception. This scientific direction is currently relevant, since it is related to the problem of security and data protection in current information and communication networks. The article is devoted to quantum cryptography; it describes the development of quantum protocols as quantum key distribution systems. Grounded on the laws of quantum mechanics, the elaboration of modifications of secure data transfer protocols is shown. The authors considered the best-known protocol to be BB84 of quantum key distribution; a more modern modification of this protocol is BB84 Info-Z. Comparative analysis of these has also been carried out. It has been established that the BB84-Info-Z quantum protocol works more efficiently than BB84 since its lower error threshold allows the interceptor to obtain much less information about the secret key. The authors put forward a new idea to improve the BB84 protocol (which has been quite outdated for almost 40 years), due to the increase in modern requirements for quantum cryptography protocols. The modification is called CSLOE-2022. It enables significant intensification of cryptographic strength and the entanglement degree of the interceptor (cryptanalyst), which greatly complicates the very possibility of intercepting information. The ultimate goal of the CSLOE-2022 modification is to complicate the eavesdropping process so much that it can be considered completely useless for an attacker in terms of wasting time and resources. The modification allows exceeding the known speed limit of key generation without repeaters since it uses two sources, the phases of which, in addition to the hundreds of kilometers of fiber between them, are very difficult to stabilize. Comparison of the protocols by working distance showed that for BB84, this distance does not exceed 70 km; for BB84-Info-Z it is similar, at no more than 70 km, and the modification of CSLOE-2022 proposed by the authors theoretically allows increasing the working distance of the quantum protocol to 511 km (7.3 times).
引用
收藏
页数:19
相关论文
共 47 条
[1]   Composite-pulse magnetometry with a solid-state quantum sensor [J].
Aiello, Clarice D. ;
Hirose, Masashi ;
Cappellaro, Paola .
NATURE COMMUNICATIONS, 2013, 4
[2]   Entanglement and Non-Locality in Quantum Protocols with Identical Particles [J].
Benatti, Fabio ;
Floreanini, Roberto ;
Marzolino, Ugo .
ENTROPY, 2021, 23 (04)
[3]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[4]   Security of quantum cryptography against collective attacks [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 78 (11) :2256-2259
[5]  
Blunt NS, 2022, Arxiv, DOI [arXiv:2206.00551, 10.1021/acs.jctc.2c00574, DOI 10.1021/ACS.JCTC.2C00574]
[6]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[7]   Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis [J].
Boyer, Michel ;
Liss, Rotem ;
Mor, Tal .
THEORETICAL COMPUTER SCIENCE, 2020, 801 :96-109
[8]   Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks [J].
Boyer, Michel ;
Gelles, Ran ;
Mor, Tal .
ALGORITHMS, 2009, 2 (02) :790-807
[9]   Nonlinear frequency conversion using high-quality modes in GaAs nanobeam cavities [J].
Buckley, Sonia ;
Radulaski, Marina ;
Zhang, Jingyuan Linda ;
Petykiewicz, Jan ;
Biermann, Klaus ;
Vuckovic, Jelena .
OPTICS LETTERS, 2014, 39 (19) :5673-5676
[10]   Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation [J].
Cardoso-Isidoro, Carlos ;
Delgado, Francisco .
SYMMETRY-BASEL, 2022, 14 (04)