Simple explanation on why QKD keys have not been proved secure

نویسنده

  • Horace Yuen
چکیده

A simple counter-example is given on the prevalent interpretation of the trace distance criterion as failure probability in quantum key distribution protocols. A summary of its ramifications is listed. Quantum key distribution (QKD) is widely perceived to have been proved “secure” in various protocols, in contrast to conventional encryption methods. In particular, perfect security is taken to hold with a high probability [1] for finite concrete protocols. In this short note we give a simple explanation on why that is not the case and summarize some of the major ramifications. The reader can trace some details from the literature. Protection of data privacy has become an increasingly important problem that affects even our daily lives. Let Adam and Babe be two users with private communications and Eve an attacker who wants to learn about the communication content. Protection can be obtained by the mod-2 addition of each “plaintext” data bit Xi by a key bit Ki to form the “ciphertext” bit Yi, i the index for the sequence. If the bits Ki are uniformly distributed, i.e., each Ki takes the bit value 0 or 1 with probability 1/2 and is statistically independent of other Ki bits, perfect secrecy on Xi is obtained in that Eve who intercepts the ciphertext cannot tell what Xi is, other than the guess it is 0 or 1 with probability 1/2. This “one-time pad” encryption requires pre-shared sequence K = {Ki} between the users to be as long as the data sequence X = {Xi}, which is impractical in most application situations. In conventional cryptography a cipher with short shared secret key K that is often obtained by public-key method, is used as the seed key of an encryption cypher in lieu of one-time pad. The security of such approach depends on the unproved complexity based security on the public-key generation of K and the unproved security of the encryption cipher with a short seed key. QKD proposes to provide “information theoretic

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Yuen's Criticisms on Security of Quantum Key Distribution and Onward

Quantum Key Distribution (QKD) has been attracting researchers that it would provide provable security to distribute secret keys since its birth in 1984. Since 2005, the trace distance between an ideal quantum state and an actually distributed state has been employed to evaluate its security level, and the trace distance was given an interpretation that it would be a maximum failure probability...

متن کامل

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational dis...

متن کامل

The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)

Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an ...

متن کامل

Secure quantum key distribution using continuous variables of single photons.

We analyze the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CV-QKD) are ina...

متن کامل

Architecture and protocols of the future European quantum key distribution network

A point-to-point quantum key distribution (QKD) system takes advantage of the laws of quantum physics to establish secret keys between two communicating parties. Compared to the classical methods, such as public-key infrastructures, QKD offers unconditional security, which makes it attractive for very high security applications. However, this unprecedent level of security is mitigated by the in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1408.4780  شماره 

صفحات  -

تاریخ انتشار 2014