Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

2007 ◽  
Vol 76 (3) ◽  
Author(s):  
Osamu Hirota
2013 ◽  
Vol 7 (4) ◽  
pp. 313-332 ◽  
Author(s):  
Mohammad Ali Orumiehchiha ◽  
Josef Pieprzyk ◽  
Ron Steinfeld ◽  
Harry Bartlett

Abstract. Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.


2021 ◽  
Vol 257 ◽  
pp. 01006
Author(s):  
Kaicheng Liu ◽  
Ying Guo ◽  
Dan Wang ◽  
Dezhi Li ◽  
Guixiong He

Regional integrated energy system (RIES) can realize multi-energy conversion and complementation so as to improve energy efficiency, which also brings more security risks. The regional integrated energy system security region (RIESSR) is a security analysis method to describe the safe area for the operating points of RIES based on the N-1 guideline. As a controllable device, energy storage (ES) which is installed in the energy hub (EH) plays an important role in improving system security. Therefore, this paper establishes the model of practical security region of RIES integrating energy storage, and studies the impact of ES on total supply capability (TSC) and practical security boundary. Finally, a specific case is set to simulate and verify the model. By comparing the scenario with ES and the scenario without ES, it can be seen that the solution result of TSC increases and the security region extends across quadrant when the RIES is integrated with ES system. The capacity and location of the ES also impact on TSC and RIESSR.


2019 ◽  
Vol 3 (1) ◽  
pp. 14
Author(s):  
Antonius Cahya Prihandoko ◽  
D. Dafik ◽  
Ika Hesti Agustin

This paper is aimed to study the use of super (<em>a, d</em>)-<em>H</em> antimagic total graph on generating encryption keys that can be used to establish a stream cipher. Methodology to achieve this goal was undertaken in three steps. First of all the existence of super (<em>a, d</em>)-<em>H</em>-antimagic total labeling was proven. At the second step, the algorithm for utilizing the labeling to construct a key stream was developed, and finally, the mechanism for applying the key to establish a stream cipher was constructed. As the result, according to the security analysis, it can be shown that the developed cryptographic system achieve a good security.


2012 ◽  
Vol 61 (8) ◽  
pp. 080301
Author(s):  
Lu Yuan ◽  
Huang Peng ◽  
Zhu Jun ◽  
Dai Wen-Chao ◽  
Zeng Gui-Hua

2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Wei Zhao ◽  
Ronghua Shi ◽  
Duan Huang

AbstractBy manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.


2021 ◽  
Author(s):  
Ivan S. Sushchev ◽  
Diana M. Guzairova ◽  
Andrey N. Klimov ◽  
Dmitriy A. Dvoretskiy ◽  
Sergey A. Bogdanov ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document