Comment on “Exposed-Key Weakness of αη”

نویسنده

  • Horace P. Yuen
چکیده

We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers and on an invalid statistical independence assumption. We generalize earlier work on nonrandom ciphers to random ciphers like αη and show that expressions of the kind given by Ahn and Birnbaum can at best be interpreted as lower bounds on the average number of spurious keys seen by the eavesdropper and thus cannot in principle establish insecurity of the system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

8 Comment on “ Exposed - Key Weakness of αη ” [ Phys . Lett . A 370

We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers. We ge...

متن کامل

8 Comment on “ Exposed - Key Weakness of αη ” [ Phys . Lett . A 370 ( 2007 ) 131 ]

We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers. We ge...

متن کامل

On the security of αη: response to 'some attacks on quantum-based cryptographic protocols'

Lo and Ko in [1] have developed some attacks on the cryptosystem called αη [2], claiming that these attacks undermine the security of αη for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrea...

متن کامل

Reply to comment on Y-00 quantum secure communication protocol

Recently, a criticism of the Yuen protocol (αη scheme) was made. This letter shows that the claim by Nishioka, and Imai group(Mitsubishi and University of Tokyo) is incorrect before they discuss whether αη scheme is quantum or classical. This misunderstanding comes from that these authors disregard the concept of signal detection theory and the basic concept of Y-00. Several industries have sta...

متن کامل

On the Security of the Y-00 (αη) Direct Encryption Protocol

We review the current status of the αη direct encryption protocol. After describing αη, we summarize the main security claims made on it. We then describe recent attacks developed against it in the literature, and suggest security enhancements and future research directions based on our results.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009