How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?

نویسندگان

چکیده

We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages the message mode, while being undetectable mode. Under there is therefore no disturbance mode mutual information between sender receiver always constant equal to one copied by are genuine. An can only be detected control but level of detection at protocol should aborted not defined. examine steps evaluate its security find that redesigned. also compare it with one-way asymmetric BB84-like basis serves as other does have

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sufficient Condition for Secure Ping-Pong Protocols

A sufficient condition for secure ping–pong protocols is repretsented. This condition, called name– suffixing, is essentially to insert identities of participants in messages. We prove its sufficiency and discuss the feature of security in terms of name–suffixing.

متن کامل

Attack the ‘ping-pong’ protocol without eavesdropping

Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...

متن کامل

On the Security of Ping-Pong Protocols

Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant ; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back . This "ping-pong" action continues several times, using sequences of operators as specified by the protocol . The...

متن کامل

An Analysis of VoIP Secure Key Exchange Protocols against Man-in-the-Middle Attack

This paper presents a brief survey about the existing key exchange protocols namely MIKEY, ZRTP and SDES. The core features of these protocols and their suitability to SIP-VoIP Networks are analyzed in this paper. The focused research area in VoIP is related to the Security and Quality of service of the Voice data. Among these areas VoIP security and confidentiality of voice data turns to be a ...

متن کامل

Ping-Pong Protocols as Prefix Grammars and Turchin Relation

This paper describes how to verify cryptographic protocols by a general-purpose program transformation technique with unfolding. The questions of representation and analysis of the protocols as prefix rewriting grammars are discussed. In these aspects Higman and Turchin embeddings on computational paths are considered, and a refinement of Turchin’s relation is presented that allows to algorithm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Entropy

سال: 2021

ISSN: ['1099-4300']

DOI: https://doi.org/10.3390/e23020163