Some attacks on quantum-based cryptographic protocols
نویسندگان
چکیده
منابع مشابه
Some attacks on quantum-based cryptographic protocols
Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, even carefully designed quantum-based cryptographic schemes may be susceptible to subtle attacks that are outside the original design. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. As a second example, we...
متن کاملCryptographic Protocols under Quantum Attacks
The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional set...
متن کاملOn the security of αη: response to 'some attacks on quantum-based cryptographic protocols'
Lo and Ko in [1] have developed some attacks on the cryptosystem called αη [2], claiming that these attacks undermine the security of αη for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrea...
متن کاملSuperposition Attacks on Cryptographic Protocols
Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece of information. Even if the protocol is quantum, the queries are typically classical. In this paper, we introduce a...
متن کاملAttacks on Cryptographic Hashes in Internet Protocols
Attacks on Cryptographic Hashes in Internet Protocols Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract Recent announcements of better-than-expected collision attacks in popular hash algorithms have caused some people to question whether common Internet protocols n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information and Computation
سال: 2005
ISSN: 1533-7146,1533-7146
DOI: 10.26421/qic5.1-4