全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

On Security of Quantum Cryptography by Probabilistic Analysis

DOI: 10.4236/jqis.2022.124008, PP. 91-98

Keywords: Quantum Cryptography, Classical Cryptography, Fundamental Equations, Unique Solution, Probability, Insecure

Full-Text   Cite this paper   Add to My Lib

Abstract:

The existing quantum cryptography is a classical cryptography in nature and basically insecure because of its classical (conventional) bits, classical encryption algorithm and classical (public) channel. A novel topic about successful communication between the legitimate users, Alice and Bob, is discussed with probability of solution uniqueness of Bob’s decryption equation. We find, by probabilistic analysis, that success of communication between Alice and Bob is probabilistic with a probability bigger than 1/2. It is also novel to define insecurity of the quantum cryptography by probability of solution uniqueness of the search equation of Eve, the eavesdropper. The probability of Eve’s success to find the plain-text of Alice (and Bob) is greater than 1/2, and so the quantum cryptography is seriously insecure.

References

[1]  Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 9-12 December 1984, 175-179.
[2]  Ekert, A.K. (1991) Quantum Cryptography Based on Bell’s Theorem. Physical Review Letters, 67, 661-663.
https://doi.org/10.1103/PhysRevLett.67.661
[3]  Bennett, C.H. (1992) Quantum Cryptography Using Any Two Nonorthogonal States. Physical Review Letters, 68, 3121-3124.
https://doi.org/10.1103/PhysRevLett.68.3121
[4]  Biham, E., Boyer, M., Boykin, P.O., Mor, T. and Roychowdhury, V. (2000) A Proof of the Security of Quantum Key Distribution. In: Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, ACM Press, New York, 715-724.
https://doi.org/10.1145/335305.335406
[5]  Shor, P.W. and Preskill, J. (2000) Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85, 441-444.
https://doi.org/10.1103/PhysRevLett.85.441
[6]  Mayers, D. (2001) Unconditional Security in Quantum Cryptography. Journal of the ACM, 48, 351-406.
https://doi.org/10.1145/382780.382781
[7]  Mayers, D. (2002) Shor and Preskill’s and Mayers’s Security Proof for the BB84 Quantum Key Distribution Protocol. The European Physical Journal D, 18, 161-170.
https://doi.org/10.1140/epjd/e20020020
[8]  Gottesman, D. and Lo, H.-K. (2003) Proof of Security of Quantum Key Distribution with Two-Way Classical Communications. IEEE Transactions on Information Theory, 49, 457-475.
https://doi.org/10.1109/TIT.2002.807289
[9]  Lo, H.-K., Chau, H.F. and Ardehali, M. (2005) Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. Journal of Cryptology, 18, 133-165.
https://doi.org/10.1007/s00145-004-0142-y
[10]  Renner, R., Gisin, N. and Kraus, B. (2005) Information-Theoretic Security Proof for Quantum-Key-Distribution Protocols. Physical Review A, 72, Article ID: 012332.
https://doi.org/10.1103/PhysRevA.72.012332
[11]  Boyer, M., Liss, R. and Mor, T. (2020) Composable Security against Collective Attacks of a Modified BB84 QKD Protocol with Information Only in One Basis. Theoretical Computer Science, 801, 96-109.
https://doi.org/10.1016/j.tcs.2019.08.014
[12]  Su, H.-Y. (2020) Simple Analysis of Security of the BB84 Quantum Key Distribution Protocol. Quantum Information Processing, 19, Article No. 169.
https://doi.org/10.1007/s11128-020-02663-z
[13]  Tsurumaru, T. (2020) Leftover Hashing from Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution. IEEE Transactions on Information Theory, 66, 3465-3484.
https://doi.org/10.1109/TIT.2020.2969656
[14]  Zhang, Q. and Tang, C.-J. (2002) Simple Proof of the Unconditional Security of the Bennett 1992 Quantum Key Distribution Protocol. Physical Review A, 65, Article ID: 062301.
https://doi.org/10.1103/PhysRevA.65.062301
[15]  Tamaki, K., Koashi, M. and Imoto, N. (2003) Unconditionally Secure Key Distribution Based on Two Non-Orthogonal States. Physical Review Letters, 90, Article ID: 167904.
https://doi.org/10.1103/PhysRevLett.90.167904
[16]  Tamaki, K. and Lütkenhaus, N. (2004) Unconditional Security of the Bennett 1992 Quantum Key Distribution Protocol over Lossy and Noisy Channel. Physical Review A, 69, Article ID: 032316.
https://doi.org/10.1103/PhysRevA.69.032316
[17]  Tamaki, K., Lütkenhaus, N., Koashi, M. and Batuwantudawe, J. (2009) Unconditional Security of the Bennett 1992 Quantum-Key-Distribution Scheme with a Strong Reference Pulse. Physical Review, 80, 32302-32310.
https://doi.org/10.1103/PhysRevA.80.032302
[18]  Lucamarini, M., Giuseppe, G. and Tamaki, K. (2009) Robust Unconditionally Secure Quantum Key Distribution with Two Non-Orthogonal and Uninformative States. Physical Review A, 80, Article ID: 032327.
https://doi.org/10.1103/PhysRevA.80.032327
[19]  Ali, N., Radzi, N.A.N., Aljunid, S.A. and Endut, R. (2020) Security of B92 Protocol with Uninformative States in Asymptotic Limit with Composable Security. AIP Conference Proceedings, 2203, Article ID: 020049.
https://doi.org/10.1063/1.5142141
[20]  Zhao, J.Z. (2022) A Quantum Mechanical Proof of Insecurity of the Theoretical QKD Protocols. Journal of Quantum Information Science, 12, 53-63.
https://doi.org/10.4236/jqis.2022.123006
[21]  Shannon, C.E. (1949) Communication Theory of Secrecy Systems. Bell System Technical Journal, 28, 656-715.
https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
[22]  Grover, L.K. (1996) A Fast Quantum Mechanical Algorithm for Database Search. In: Proceedings 28th ACM Symposium on the Theory of Computation, ACM Press, New York, 212-219.
https://doi.org/10.1145/237814.237866
[23]  Grover, L.K. (1997) Quantum Mechanics Helps in Searching for a Needle in a Haystack. Physical Review Letters, 79, 325-328.
https://doi.org/10.1103/PhysRevLett.79.325
[24]  Ndagijimana, P., Nahayo, F., Assogba, M.K., Ametepe, A.F.-X. and Shabani, J. (2020) Towards Post-Quantum Cryptography Using Thermal Noise Theory and True Random Numbers Generation. Journal of Information Security, 11, 149-160.
https://doi.org/10.4236/jis.2020.113010

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133