Attacks on quantum key distribution protocols that employ non-ITS authentication

被引:0
作者
C. Pacher
A. Abidin
T. Lorünser
M. Peev
R. Ursin
A. Zeilinger
J.-Å. Larsson
机构
[1] AIT Austrian Institute of Technology,Digital Safety & Security Department
[2] Linköping University,Department of Electrical Engineering
[3] Austrian Academy of Sciences,Institute for Quantum Optics and Quantum Information
[4] University of Vienna,Vienna Center for Quantum Science and Technology (VCQ), Faculty of Physics
来源
Quantum Information Processing | 2016年 / 15卷
关键词
Quantum key distribution; Information-theoretic security; Message authentication; Collision attacks; Man-in-the-middle attack;
D O I
暂无
中图分类号
学科分类号
摘要
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
引用
收藏
页码:327 / 362
页数:35
相关论文
共 50 条
  • [31] SECURITY ANALYSIS OF THE TIME-CODING QUANTUM KEY DISTRIBUTION PROTOCOLS
    Debuisschert, Thierry
    Fossier, Simon
    QUANTUM INFORMATION & COMPUTATION, 2011, 11 (11-12) : 968 - 987
  • [32] Experimental implementation of distributed phase reference quantum key distribution protocols
    Kumar, Satish
    Malpani, Priya
    Mishra, Sandeep
    Pathak, Anirban
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (07)
  • [33] New Efficient Three-Party Quantum Key Distribution Protocols
    Shih, Han-Cheng
    Lee, Kuo-Chang
    Hwang, Tzonelih
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2009, 15 (06) : 1602 - 1606
  • [34] Causes of bit error and error correction for quantum key distribution protocols
    Fang, Rushui
    Nikulin, Vladimir V.
    QUANTUM NANOPHOTONIC MATERIALS, DEVICES, AND SYSTEMS 2019, 2019, 11091
  • [35] Trojan-horse attacks on quantum key distribution with classical Bob
    Yang, Yu-Guang
    Sun, Si-Jia
    Zhao, Qian-Qian
    QUANTUM INFORMATION PROCESSING, 2015, 14 (02) : 681 - 686
  • [36] QUANTUM KEY DISTRIBUTION WITH SEVERAL CLONING ATTACKS VIA A DEPOLARIZING CHANNEL
    Dehmani, Mustapha
    Ez-Zahraouy, Hamid
    Benyoussef, Abdelilah
    JOURNAL OF RUSSIAN LASER RESEARCH, 2015, 36 (03) : 228 - 236
  • [37] Attacks on practical quantum key distribution systems (and how to prevent them)
    Jain, Nitin
    Stiller, Birgit
    Khan, Imran
    Elser, Dominique
    Marquardt, Christoph
    Leuchs, Gerd
    CONTEMPORARY PHYSICS, 2016, 57 (03) : 366 - 387
  • [38] Trojan-horse attacks on quantum key distribution with classical Bob
    Yu-Guang Yang
    Si-Jia Sun
    Qian-Qian Zhao
    Quantum Information Processing, 2015, 14 : 681 - 686
  • [39] Quantum Key Distribution with Several Cloning Attacks via a Depolarizing Channel
    Mustapha Dehmani
    Hamid Ez-Zahraouy
    Abdelilah Benyoussef
    Journal of Russian Laser Research, 2015, 36 : 228 - 236
  • [40] Quantum Key-Distribution Protocols Based on a Quantum Version of the Monty Hall Game
    Quezada, Luis Fernando
    Dong, Shi-Hai
    ANNALEN DER PHYSIK, 2020, 532 (06)