A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography
نویسنده
چکیده
Quantum Key Distribution (QKD) or ”quantum cryptography” is a Quantum Mechanics based cryptographic primitive which, in principle, holds the potential of absolutely secure communication that cannot be compromised by any eavesdropping technique. The strength of the QKD primitive is the unconditionally secure simultaneous generation of two identical bit streams at two distinct locations which subsequently could be used as a key in symmetric (unconditionally or computationally secure) encryption schemes. However, it is well known that QKD requires a public channel with trusted integrity as otherwise a potential adversary (Eve) can easily mount a ”man-in-the-middle attack”. In case the eavesdropper can manipulate messages on the public channel there is no way to guarantee that in the course of a QKD protocol the two legitimate communication parties (Alice and Bob) are really exchanging the messages they are sending to each other. Eve can simply cut the quantum channel and subsequently communicate over both the quantum and the public channels with Bob as if she would be Alice and with Alice as if she would be Bob. Eventually, she would thus share two independent keys with the two legitimate parties and gain full control of all the subsequently transmitted encrypted information without being noticed at all. The described type of attack can be counteracted by authenticating the QKD protocol messages transmitted over the public channel. Basically public key authentication methods and symmetric key authentication methods can be used (see Ref. [1] for a discussion of the relative merits and drawbacks of these methods). It is however straightforward to notice that unconditionally secure key generation by means of QKD is only feasible if it is combined with methods providing unconditionally secure authentication. Standard public key methods are automatically ruled out if one would stick to this requirement as the latter are only computationally secure and potentially subject to cryptanalysis by means of quantum computers. Therefore, already in Ref. [2] it was proposed to use unconditionally secure symmetric message authentication methods as e.g. developed in Ref. [3] to ensure the integrity of the public channel. The main idea of the application of these methods in QKD is to intertwine the transcript of the public channel communication with an independent secret, which the two legitimate parties share and on this basis provide a mechanism for authenticating this communication. Alice and Bob need therefore an initial secret key, which they use only once. Subsequently in each QKD session they repeatedly renew the mutual secret by reserving part of the newly generated key. This key is to be used for channel authentication purposes in the next session. This paradigm has been elaborated in subsequent publications[4, 5]. It should be noted that while thus the unconditional security of QKD is retained, it is basically degraded from a secret key generation scheme in the strict sense to a secret key growing technique. In what follows we restrict our discussion to symmetric key message authentication methods and, similar to Wegman and Carter[3], base our approach on strongly universal2 functions. In Section 2 we discuss a general method for producing message authentication tags using only a moderate amount of the secret key. In Section 3 we briefly discuss the details of the authentication algorithm in relation to the QKD protocol. We also present a modular integrated software library implementing full scale QKD-protocols including public channel authentication used in the framework of a recent quantum cryptographic experiment[6].
منابع مشابه
VULNERABILITY OF “A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY” AYSAJAN ABIDIN and JAN-ÅKE LARSSON
In this paper we review and comment on “A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography”, [M. Peev et al., Int. J. Quant. Inform., 3, 225, (2005)]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic pr...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملRULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY” AYSAJAN ABIDIN and JAN-ÅKE LARSSON
Quantum Cryptography, or more accurately Quantum Key Distribution (QKD), is an unconditionally secure key growing technique based on the principles of quantum mechanics. It is unconditionally secure because no quantum state can be copied or measured without disturbing it. However, the practical implementation of QKD protocols requires an immutable public channel. In case the public channel is n...
متن کاملWeaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions
Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. Therefore, to guarantee unconditional security of any Quantum Cryptographic protocols, the authentication used must also be unconditionally sec...
متن کاملClassical Authentication Aided Three-Stage Quantum Protocol
This paper modifies Kak’s three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key dist...
متن کاملAttack on a classical analogue of the Dunjko, Wallden, Kent and Andersson quantum digital signature protocol
A quantum digital signature (QDS) protocol is investigated in respect of an attacker who can impersonate other communicating principals in the style of Lowe’s attack on the Needham-Schroeder public-key authentication protocol. A man-in-the-middle attack is identified in respect of a classical variant of the protocol and it is suggested that a similar attack would be effective against the QDS pr...
متن کامل