Attacks on Fixed Apparatus Quantum Key Distribution Schemes
نویسندگان
چکیده
We consider quantum key distribution implementations in which the receiver’s apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver’s equipment. The attack we present here, the “fixed-apparatus attack” causes a potential risk to the usefulness of several recent implementations.
منابع مشابه
Random Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملDevice-Independent Quantum Key Distribution with Commuting Measurements
We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.
متن کاملSecurity of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks
The theoretical Quantum Key-Distribution scheme of Bennett and Brassard (BB84) has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful...
متن کاملSecurity of quantum key distribution with entangled photons against individual attacks
We investigate the security of quantum key distribution with entangled photons, focusing on the two-photon variation of the Bennett-Brassard 1984 ~BB84! protocol proposed in 1992 by Bennett, Brasard, and Mermin ~BBM92!. We present a proof of security which applies to realistic sources, and to untrustable sources which can be placed outside the labs of the two receivers. The proof is restricted ...
متن کاملSecurity of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کامل