An Attack to Quantum Cryptography from Space
نویسنده
چکیده
The promise of secure cryptographic quantum key distribution schemes is based on the use of quantum effects in the spin space. We point out that in fact in many current quantum cryptography protocols the space part of the wave function is neglected. However exactly the space part of the wave function describes the behaviour of particles in ordinary real three-dimensional space. As a result such schemes can be secure against eavesdropping attacks in the abstract spin space but could be insecure in the real three-dimensional space. We discuss an approach to the security of quantum key distribution in space by using Bell’s inequality and a special preparation of the space part of the wave function. ∗Permanent address: Steklov Mathematical Institute, Gubkin St.8, GSP-1, 117966, Moscow, Russia; [email protected]
منابع مشابه
An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملSecurity of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کاملFaked states attack on quantum cryptosystems
A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob’s scheme and constructs light pulses so that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve’s discretion. Applying this attack to systems with passive basis choice on Bob’s side is considered....
متن کاملRULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY” AYSAJAN ABIDIN and JAN-ÅKE LARSSON
Quantum Cryptography, or more accurately Quantum Key Distribution (QKD), is an unconditionally secure key growing technique based on the principles of quantum mechanics. It is unconditionally secure because no quantum state can be copied or measured without disturbing it. However, the practical implementation of QKD protocols requires an immutable public channel. In case the public channel is n...
متن کامل