Literature DB >> 33573044

How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?

Mladen Pavičić1,2.   

Abstract

We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual information between the sender and the receiver is always constant and equal to one and messages copied by the eavesdropper are always genuine. An attack can only be detected in the control mode but the level of detection at which the protocol should be aborted is not defined. We examine steps of the protocol to evaluate its security and find that the protocol should be redesigned. We also compare it with the security of a one-way asymmetric BB84-like protocol in which one basis serves as the message mode and the other as the control mode but which does have the level of detection at which the protocol should be aborted defined.

Entities:  

Keywords:  quantum cryptography; quantum key distribution; two-way communication

Year:  2021        PMID: 33573044      PMCID: PMC7911273          DOI: 10.3390/e23020163

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


  8 in total

1.  Deterministic secure direct communication using entanglement.

Authors:  Kim Boström; Timo Felbinger
Journal:  Phys Rev Lett       Date:  2002-10-11       Impact factor: 9.161

2.  Secure deterministic communication without entanglement.

Authors:  Marco Lucamarini; Stefano Mancini
Journal:  Phys Rev Lett       Date:  2005-04-14       Impact factor: 9.161

3.  Experimental test of two-way quantum key distribution in the presence of controlled noise.

Authors:  Alessandro Cerè; Marco Lucamarini; Giovanni Di Giuseppe; Paolo Tombesi
Journal:  Phys Rev Lett       Date:  2006-05-24       Impact factor: 9.161

4.  Beating the photon-number-splitting attack in practical quantum cryptography.

Authors:  Xiang-Bin Wang
Journal:  Phys Rev Lett       Date:  2005-06-16       Impact factor: 9.161

5.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

Authors:  Valerio Scarani; Renato Renner
Journal:  Phys Rev Lett       Date:  2008-05-22       Impact factor: 9.161

6.  Field test of quantum key distribution in the Tokyo QKD Network.

Authors:  M Sasaki; M Fujiwara; H Ishizuka; W Klaus; K Wakui; M Takeoka; S Miki; T Yamashita; Z Wang; A Tanaka; K Yoshino; Y Nambu; S Takahashi; A Tajima; A Tomita; T Domeki; T Hasegawa; Y Sakai; H Kobayashi; T Asai; K Shimizu; T Tokura; T Tsurumaru; M Matsui; T Honjo; K Tamaki; H Takesue; Y Tokura; J F Dynes; A R Dixon; A W Sharpe; Z L Yuan; A J Shields; S Uchikoga; M Legré; S Robyr; P Trinkler; L Monat; J-B Page; G Ribordy; A Poppe; A Allacher; O Maurhart; T Länger; M Peev; A Zeilinger
Journal:  Opt Express       Date:  2011-05-23       Impact factor: 3.894

7.  Tight finite-key analysis for quantum cryptography.

Authors:  Marco Tomamichel; Charles Ci Wen Lim; Nicolas Gisin; Renato Renner
Journal:  Nat Commun       Date:  2012-01-17       Impact factor: 14.919

8.  Security of modified Ping-Pong protocol in noisy and lossy channel.

Authors:  Yun-Guang Han; Zhen-Qiang Yin; Hong-Wei Li; Wei Chen; Shuang Wang; Guang-Can Guo; Zheng-Fu Han
Journal:  Sci Rep       Date:  2014-05-12       Impact factor: 4.379

  8 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.