Comment on “Exposed-Key Weakness of αη”
نویسنده
چکیده
We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers and on an invalid statistical independence assumption. We generalize earlier work on nonrandom ciphers to random ciphers like αη and show that expressions of the kind given by Ahn and Birnbaum can at best be interpreted as lower bounds on the average number of spurious keys seen by the eavesdropper and thus cannot in principle establish insecurity of the system.
منابع مشابه
8 Comment on “ Exposed - Key Weakness of αη ” [ Phys . Lett . A 370
We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers. We ge...
متن کامل8 Comment on “ Exposed - Key Weakness of αη ” [ Phys . Lett . A 370 ( 2007 ) 131 ]
We show that the claim of insecurity of the Y-00 (or αη) cryptosystem made by C. Ahn and K. Birnbaum in Phys. Lett. A 370 (2007) 131-135 even under ciphertextonly heterodyne attack, as well as the unfavorable security comparison between αη and an additive stream cipher for all kinds of attacks, is based on invalid extrapolations of Shannon’s random cipher analysis to two concrete ciphers. We ge...
متن کاملOn the security of αη: response to 'some attacks on quantum-based cryptographic protocols'
Lo and Ko in [1] have developed some attacks on the cryptosystem called αη [2], claiming that these attacks undermine the security of αη for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrea...
متن کاملReply to comment on Y-00 quantum secure communication protocol
Recently, a criticism of the Yuen protocol (αη scheme) was made. This letter shows that the claim by Nishioka, and Imai group(Mitsubishi and University of Tokyo) is incorrect before they discuss whether αη scheme is quantum or classical. This misunderstanding comes from that these authors disregard the concept of signal detection theory and the basic concept of Y-00. Several industries have sta...
متن کاملOn the Security of the Y-00 (αη) Direct Encryption Protocol
We review the current status of the αη direct encryption protocol. After describing αη, we summarize the main security claims made on it. We then describe recent attacks developed against it in the literature, and suggest security enhancements and future research directions based on our results.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009