SwePub
Sök i LIBRIS databas

  Utökad sökning

onr:"swepub:oai:DiVA.org:liu-91260"
 

Sökning: onr:"swepub:oai:DiVA.org:liu-91260" > Attacks on quantum ...

Attacks on quantum key distribution protocols that employ non-ITS authentication

Pacher, Christoph (författare)
Department of Safety & Security, AIT Austrian Institute of Technology, Austria
Abidin, Aysajan (författare)
Linköpings universitet,Informationskodning,Tekniska högskolan
Lorünser, Thomas (författare)
Department of Safety & Security, AIT Austrian Institute of Technology, Austria
visa fler...
Peev, Momtchil (författare)
Department of Safety & Security, AIT Austrian Institute of Technology, Austria
Ursin, Rupert (författare)
Institut für Experimentalphysik, Universität Wien, Austria and Institute for Quantum Optics and Quantum Information, Austrian Academy of Sciences, Austria
Zeilinger, Anton (författare)
Institut für Experimentalphysik, Universität Wien, Austria and Institute for Quantum Optics and Quantum Information, Austrian Academy of Sciences, Austria
Larsson, Jan-Åke (författare)
Linköpings universitet,Informationskodning,Tekniska högskolan
visa färre...
 (creator_code:org_t)
2015-11-13
2016
Engelska.
Ingår i: Quantum Information Processing. - : Springer Publishing Company. - 1570-0755 .- 1573-1332. ; 15:1, s. 327-362
  • Tidskriftsartikel (refereegranskat)
Abstract Ämnesord
Stäng  
  • We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols.In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity.Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKDpostprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.

Publikations- och innehållstyp

ref (ämneskategori)
art (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy