scholarly journals ACHIEVING UNCONDITIONAL SECURITY IN EXISTING NETWORKS USING QUANTUM CRYPTOGRAPHY

2002 ◽  
Vol 2 (6) ◽  
pp. 434-442
Author(s):  
J. Larsson

Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure ``quantum channel'' to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One example is the BB84 protocol, where the quantum channel can be implemented in polarization of single photons. Here, use of several photons instead of one to encode each bit of the key provides a similar but insecure system. For protocols based on violation of a Bell inequality (e.g., the Ekert protocol) the situation is somewhat different. While the possibility is mentioned by some authors, it is generally thought that an implementation of a (semi-)classical channel will differ significantly from that of a quantum channel. Here, a counterexample will be given using an identical physical setup as is used in photon-polarization Ekert QKD. Since the physical implementation is identical, a manufacturer may include this modification as a Trojan Horse in manufactured systems, to be activated at will by an eavesdropper. Thus, the old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device. Even when you do violate the Bell inequality.


2006 ◽  
Vol 04 (06) ◽  
pp. 1003-1012 ◽  
Author(s):  
SYED M. ASSAD ◽  
JUN SUZUKI ◽  
BERTHOLD-GEORG ENGLERT

We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographically incomplete protocols, where the key is generated by one-way communication rather than the usual two-way communication. Our analysis, backed by numerical evidence, establishes thresholds for eavesdropping attacks on the raw data and on the generated key at quantum bit error rates of 10% and 6.15%, respectively. Both thresholds are lower than the threshold for unconditional security in the standard BB84 protocol.


2019 ◽  
Vol XXII (1) ◽  
pp. 171-176
Author(s):  
Zisu L.

Quantum cryptography, the principles of which are based on classical mechanics laws, solves exceptionally the issue of key distribution in classical cryptography. BB84, the first quantum key distribution created by Charles Bennett and Gilles Brassard in 1984 offers unconditional security and allows the transmission of a key with the length equal to the length of the message. According to Vernom, using the key with the above feature once together with an encryption algorithm leads to the formation of a most secure cryptographic system. The paper presents a method for improving the BB84 quantum protocol, using ten states of polarization, quantum memory and direct communication in both directions. The implementation of both the proposed method and the BB84 protocol was done through a C# application.


Sign in / Sign up

Export Citation Format

Share Document