RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY” AYSAJAN ABIDIN and JAN-ÅKE LARSSON

نویسنده

  • AYSAJAN ABIDIN
چکیده

Quantum Cryptography, or more accurately Quantum Key Distribution (QKD), is an unconditionally secure key growing technique based on the principles of quantum mechanics. It is unconditionally secure because no quantum state can be copied or measured without disturbing it. However, the practical implementation of QKD protocols requires an immutable public channel. In case the public channel is not immutable, the eavesdropper (Eve) can easily mount a “man-in-the-middle attack”, since Eve is in control of both the quantum and the public channels. For the attack to be successful Eve needs, among other things, to substitute the classical message from one legitimate user (Alice) to the other (Bob) without being noticed. To prohibit such an attack on QKD, proper message authentication is needed. Therefore, QKD is secure only if it is combined with an unconditionally secure message authentication scheme. In this paper we will review a recently proposed authentication protocol1 and point out that it is not secure. It has earlier been shown2 that an attack is possible against the “privacy amplification” step in a QKD protocol using the proposed authentication, but the attack presented here is more serious and enables a full man-in-the-middle attack on the whole system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

VULNERABILITY OF “A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY” AYSAJAN ABIDIN and JAN-ÅKE LARSSON

In this paper we review and comment on “A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography”, [M. Peev et al., Int. J. Quant. Inform., 3, 225, (2005)]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic pr...

متن کامل

Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions

Authentication is an indispensable part of Quantum Cryptography, which is an unconditionally secure key distribution technique based on the laws of nature. Without proper authentication, Quantum Cryptography is vulnerable to “man-in-the-middle” attacks. Therefore, to guarantee unconditional security of any Quantum Cryptographic protocols, the authentication used must also be unconditionally sec...

متن کامل

Attacks on quantum key distribution protocols that employ non-ITS authentication

We demonstrate how adversaries with large computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a se...

متن کامل

Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman&Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal2 hash function family...

متن کامل

Authentication in Quantum Key Distribution : Security Proof and Universal Hash Functions

Quantum Key Distribution (QKD) is a secret key agreement technique that consists of two parts: quantum transmission and measurement on a quantum channel, and classical post-processing on a public communication channel. It enjoys provable unconditional security provided that the public communication channel is immutable. Otherwise, QKD is vulnerable to a man-in-the-middle attack. Immutable publi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009