Quantum-Space Attacks

نویسندگان

  • Ran Gelles
  • Tal Mor
چکیده

Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as attacks on such protocols, is still missing. We describe a general method of attacking realistic QKD protocols, which we call the ‘quantum-space attack’. The description is based on assessing the enlarged quantum space actually used by a protocol, the ‘quantum space of the protocol’. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD. ar X iv :0 71 1. 30 19 v1 [ qu an tph ] 1 9 N ov 2 00 7

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of Interferometric Quantum Key Distribution

Many quantum key distribution (QKD) schemes are based on sending and measuring qubits—twodimensional quantum systems. Yet, in practical realizations and experiments, the measuring devices at the receiver’s (Bob) site commonly do not measure a two-dimensional system but rather a quantum space of a larger dimension. Such an enlargement sometimes results from imperfect devices. However, in various...

متن کامل

Security analysis of Quantum-Readout PUFs in the case of generic challenge-estimation attacks

Quantum Readout PUFs (QR-PUFs) have been proposed as a technique for remote authentication of objects. The security is based on basic quantum information theoretic principles and the assumption that the adversary cannot efficiently implement arbitrary unitary transformations. We analyze the security of QR-PUF schemes in the case where each challenge consists of precisely n quanta and the dimens...

متن کامل

Quantum attacks against iterated block ciphers

We study the amplification of security against quantum attacks provided by iteration of block ciphers. In the classical case, the Meet-in-the-middle attack is a generic attack against those constructions. This attack reduces the time required to break double iterations to only twice the time it takes to attack a single block cipher, given that the attacker has access to a large amount of memory...

متن کامل

Quantum key distribution using multilevel encoding: security analysis

We propose an extension of quantum key distribution based on encoding the key into quNits, i.e. quantum states in an N-dimensional Hilbert space. We estimate both the mutual information between the legitimate parties and the eavesdropper, and the error rate, as a function of the dimension of the Hilbert space. We derive the information gained by an eavesdropper using optimal incoherent attacks ...

متن کامل

Theoretical and Computational Evaluation of the Use of Molecular Nanoelectronic Technology in Targeted Monitoring of Electrical Brain Waves to Predict Some Neuro-cerebral Attacks

Abstract Background and Objectives: Today, it is expected that by using molecular nanoelectronic, the symptoms emitted from neurons will be studied. Many studies show that abnormalities in the normal functioning of brain cells can lead to neurological attacks. One of the most common brain system defects is epileptic seizures. In this case, due to the electrical discharge of a group of neurons,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008