| Literature DB >> 34893658 |
Zixuan Hu1,2, Sabre Kais3,4.
Abstract
Quantum cryptography-the application of quantum information processing and quantum computing techniques to cryptography has been extensively investigated. Two major directions of quantum cryptography are quantum key distribution (QKD) and quantum encryption, with the former focusing on secure key distribution and the latter focusing on encryption using quantum algorithms. In contrast to the success of the QKD, the development of quantum encryption algorithms is limited to designs of mostly one-time pads (OTP) that are unsuitable for most communication needs. In this work we propose a non-OTP quantum encryption design utilizing a quantum state creation process to encrypt messages. As essentially a non-OTP quantum block cipher the method stands out against existing methods with the following features: 1. complex key-ciphertext relation (i.e. confusion) and complex plaintext-ciphertext relation (i.e. diffusion); 2. mode of operation design for practical encryption on multiple blocks. These features provide key reusability and protection against eavesdropping and standard cryptanalytic attacks.Entities:
Year: 2021 PMID: 34893658 PMCID: PMC8664820 DOI: 10.1038/s41598-021-03241-8
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Graphical illustration of the encrypting process with an 8-qubit example. The circles with numbers inside represent the qubits. The arrows represent CNOT gates for which each arrow begins at the control qubit and points to the target qubit. The numbers on the arrows indicate the order in which the CNOT gates are applied within the current step. Step 1: apply a 1-qubit to each qubit . Step 2: apply sequentially for , this step causes the downstream qubits 5–8 to gain dependences on more than half of the ’s. Step 3: use the downstream qubits 5–8 as controls and the upstream qubits 1–4 as targets to apply CNOT gates. Showing one example out of the possible ways the qubits are paired. The CNOT gates in this step all commute so the order is unimportant. After this step confusion is achieved. Step 4: with the general goal of achieving diffusion, this step has great freedom. In the particular example shown here, a series of CNOT gates run alternately between the downstream and upstream qubits. After this step diffusion is achieved.
Figure 2The first mode of operation mechanism shown with a 3-block example. In each iteration after the first one, the extra copy of the ciphertext state is measured into a classical bit string that is then XORed with the plaintext .
Figure 3The second mode of operation mechanism shown with a 3-block example. In each iteration after the first one, each qubit on the ciphertext state as the control applies a CNOT to a different qubit on the plaintext state as the target.