Attacks on quantum key distribution protocols that employ non-ITS authentication

被引:0
作者
C. Pacher
A. Abidin
T. Lorünser
M. Peev
R. Ursin
A. Zeilinger
J.-Å. Larsson
机构
[1] AIT Austrian Institute of Technology,Digital Safety & Security Department
[2] Linköping University,Department of Electrical Engineering
[3] Austrian Academy of Sciences,Institute for Quantum Optics and Quantum Information
[4] University of Vienna,Vienna Center for Quantum Science and Technology (VCQ), Faculty of Physics
来源
Quantum Information Processing | 2016年 / 15卷
关键词
Quantum key distribution; Information-theoretic security; Message authentication; Collision attacks; Man-in-the-middle attack;
D O I
暂无
中图分类号
学科分类号
摘要
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
引用
收藏
页码:327 / 362
页数:35
相关论文
共 50 条
  • [41] Quantum Key Distribution Network and Its Applications
    Tajima, Akio
    Kondoh, Takashi
    Ochi, Takao
    Fujiwara, Mikio
    Yoshino, Ken-ichiro
    Iizuka, Hiromi
    Sakamoto, Toshio
    Tomita, Akihisa
    Asami, Shione
    Sasaki, Masahide
    2018 IEEE PHOTONICS SOCIETY SUMMER TOPICAL MEETING SERIES (SUM), 2018, : 69 - 70
  • [42] A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States
    Zhang Sheng
    Wang Jian
    Tang Chao-Jing
    Zhang Quan
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2011, 56 (02) : 268 - 272
  • [43] A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States
    张盛
    王剑
    唐朝京
    张权
    CommunicationsinTheoreticalPhysics, 2011, 56 (08) : 268 - 272
  • [44] A theoretical scheme for multi-user quantum authentication and key distribution in a network
    Yang, YG
    Wen, QY
    Zhu, FC
    ACTA PHYSICA SINICA, 2005, 54 (09) : 3995 - 3999
  • [45] Three Attacks on the Mediated Semi-Quantum Key Distribution without Invoking Quantum Measurement
    Zou, Xiangfu
    Rong, Zhenbang
    Zhou, Nan-Run
    ANNALEN DER PHYSIK, 2020, 532 (08)
  • [46] Optimizing Decoy-State Protocols for Practical Quantum Key Distribution Systems
    Fan-Yuan, Guan-Jie
    Wang, Ze-Hao
    Wang, Shuang
    Yin, Zhen-Qiang
    Chen, Wei
    He, De-Yong
    Guo, Guang-Can
    Han, Zheng-Fu
    ADVANCED QUANTUM TECHNOLOGIES, 2021, 4 (04)
  • [47] Some physics and system issues in the security analysis of quantum key distribution protocols
    Horace P. Yuen
    Quantum Information Processing, 2014, 13 : 2241 - 2254
  • [48] Some physics and system issues in the security analysis of quantum key distribution protocols
    Yuen, Horace P.
    QUANTUM INFORMATION PROCESSING, 2014, 13 (10) : 2241 - 2254
  • [49] Optimal axis compensation in quantum key distribution protocols over unital channels
    Watanabe, Shun
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    THEORETICAL COMPUTER SCIENCE, 2014, 560 : 91 - 106
  • [50] On the information-splitting essence of two types of quantum key distribution protocols
    Gao, Fei
    Guo, Fen-Zhuo
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    PHYSICS LETTERS A, 2006, 355 (03) : 172 - 175