scholarly journals Photon-number Splitting Attack on SARG04 Protocol

2020 ◽  
Vol 10 (1) ◽  
pp. 157-162
Author(s):  
Dana F. Abdulqadir ◽  
Omar S. Mustafa ◽  
Ali H. Yousef

Network protection, an essential interest has migrated within this area particularly with the development of hacking, the strategies, as well as the penetration of the most effective blanketed networks. It can be stated that all the methods and protocols applied failed to forestall the intruder’s attacks, consequently many researches grew to favor quantum mechanics over create non-intrusive methods. Many scientists and researchers have introduced other cryptographic subjects in quantum computing which is known as quantum key distribution protocol. In this paper, which is an extension to our preceding work (Mustafa et al., 2019), the simulation of the overall performance of SARG04 protocol had been examined in opposition to the most time-honored attack: Photon-number splitting (PNS) assault in the quantum channel. The data received showed results that obtained high resistance against PNS attack, due to the method that was used in the sifting stage.

Author(s):  
Carl F Sabottke ◽  
Chris D Richardson ◽  
Petr Anisimov ◽  
Ulvi Yurtsever ◽  
Antia Lamas-Linares ◽  
...  

Author(s):  
Catalin Anghel

This paper presents the development, comparison and analysis of several implementations of the B92 Quantum Key Distribution (QKD) protocol. In order to achieve this objective a prototype which consists of traditional (non-quantum) simulators was created, one for B92 protocol, one for B92 protocol with eavesdropper and one for B92 protocol with Quantum Bit Travel Time (QBTT) eavesdropper detection method. The principles of quantum mechanics were studied, as a foundation of quantum cryptography, for the realization of simulation programs that were written in C ++, focusing mainly on the B92 protocol and QBTT eavesdropper detection method. We compared the Quantum Bit Error Rate (QBER) for implementation of B92 protocol without eavesdropper, B92 protocol with eavesdropper and B92 protocol with QBTT eavesdropper detection method and found that QBTT eavesdropper detection method significantly reduces the QBER from the final key.


2022 ◽  
Vol 19 (2) ◽  
pp. 025203
Author(s):  
S P Kulik ◽  
K S Kravtsov ◽  
S N Molotkov

Abstract The analysis of the security of quantum key distribution systems with respect to an attack with nondemolishing measurement of the number of photons (photon number splitting—PNS attack) is carried out under the assumption that in the communication channel in each parcel there is a pure Fock state with a different number of photons, and the distribution of states by number of photons has Poisson statistics. In reality, in the communication channel in each parcel there are not individual Fock states, but a pure coherent state with a random phase—a superposition of Fock states with different numbers of photons. The paper analyzes the necessary experimental resources necessary to prepare individual Fock states with a certain number of photons from the superposition of Fock states for a PNS attack. Optical schemes for implementing such an attack are given, and estimates of experimental parameters at which a PNS attack is possible are made.


2012 ◽  
Vol 14 (4) ◽  
pp. 043003 ◽  
Author(s):  
Carl F Sabottke ◽  
Chris D Richardson ◽  
Petr M Anisimov ◽  
Ulvi Yurtsever ◽  
Antia Lamas-Linares ◽  
...  

2017 ◽  
Vol 31 (11) ◽  
pp. 1750119 ◽  
Author(s):  
Junaid ur Rehman ◽  
Saad Qaisar ◽  
Youngmin Jeong ◽  
Hyundong Shin

Quantum key distribution (QKD) schemes rely on the randomness to exchange secret keys between two parties. A control key to generate the same (pseudo)-randomness for the key exchanging parties increases the key exchange rate. However, the use of pseudo-randomness where true randomness is required makes a classical system vulnerable to the known plain-text attack. Contrary to the belief of unavailability of this attack in QKD, we show that this attack is actually possible whenever a control key is employed. In this paper, we show that it is possible to make use of the uncertainty principle to not only avoid this attack, but also remove the hazards of photon-number splitting attack in quantum setting. We define the secrecy of control key based on the guessing probability, and propose a scheme to achieve this defined secrecy. We show the general applicability of our framework on the most common QKD schemes.


2020 ◽  
Vol 35 (36) ◽  
pp. 2050295
Author(s):  
Partha Sarathi Goswami ◽  
Tamal Chakraborty ◽  
Abir Chattopadhyay

Quantum cryptography has of late opened up the possibilities of exploiting the characteristics of quantum mechanics in the realm of network security. An interesting problem in cryptography is the distribution of the encryption key between the two parties involved in communication. This paper proposes a secure quantum key distribution protocol using the properties of super increasing knapsack sequences. The mapping from the knapsack sequences to the quantum states is achieved by rotating a three-bit quantum tuple.


Sign in / Sign up

Export Citation Format

Share Document