Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher

T. Iwakoshi, O. Hirota
{"title":"Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher","authors":"T. Iwakoshi, O. Hirota","doi":"10.1117/12.2029029","DOIUrl":null,"url":null,"abstract":"This paper presents the physical prevention probability of an Intensity-Shift-Keying (ISK) Y00 quantum stream cipher against a polarity inversion attack, where the attacker in the middle of the communication line intercepts legitimate sender’s messages and resends false messages to the legitimate receiver by inverting some of signal polarities. Message falsification is recognized as a major issue in the field of mathematical encryption. Therefore, the attack should also be studied in the field of physical encryption. Y00 protocol was proposed by H. P. Yuen in 2000 to hide even ciphertexts from eavesdroppers under quantum noise of coherent light. Theoretical and experimental analyses of encryption strength of Y00 systems have also been studied against eavesdropping. However, there were not many studies about active attacks like message falsifications. Recent studies showed that the present ISK Y00 systems, whose communication bases are paired signals, may prevent the attack under the Known-Plaintext-Attack. To enhance the probability against the attack, a quadruple-signal-based ISK Y00 system was proposed, whose signal bases are sets of 4 signals. This study shows the proposed system has a prevention probability of 0.66665 per signal, while One-Time Pad used in BB84 cannot prevent message falsification under Known-Plaintext-Attack since polarity inversion directly falsifies the message.","PeriodicalId":344928,"journal":{"name":"Optics/Photonics in Security and Defence","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optics/Photonics in Security and Defence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2029029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

This paper presents the physical prevention probability of an Intensity-Shift-Keying (ISK) Y00 quantum stream cipher against a polarity inversion attack, where the attacker in the middle of the communication line intercepts legitimate sender’s messages and resends false messages to the legitimate receiver by inverting some of signal polarities. Message falsification is recognized as a major issue in the field of mathematical encryption. Therefore, the attack should also be studied in the field of physical encryption. Y00 protocol was proposed by H. P. Yuen in 2000 to hide even ciphertexts from eavesdroppers under quantum noise of coherent light. Theoretical and experimental analyses of encryption strength of Y00 systems have also been studied against eavesdropping. However, there were not many studies about active attacks like message falsifications. Recent studies showed that the present ISK Y00 systems, whose communication bases are paired signals, may prevent the attack under the Known-Plaintext-Attack. To enhance the probability against the attack, a quadruple-signal-based ISK Y00 system was proposed, whose signal bases are sets of 4 signals. This study shows the proposed system has a prevention probability of 0.66665 per signal, while One-Time Pad used in BB84 cannot prevent message falsification under Known-Plaintext-Attack since polarity inversion directly falsifies the message.
利用Y00量子流密码的物理特性防止极性反转攻击
本文提出了强度-移位键控(ISK) Y00量子流密码对极性反转攻击的物理预防概率,在极性反转攻击中,攻击者在通信线路中间拦截合法发送者的消息,并通过反转一些信号极性向合法接收方重新发送假消息。消息伪造被认为是数学加密领域的一个主要问题。因此,攻击也应该在物理加密领域进行研究。Y00协议是由袁鸿平于2000年提出的,用于在相干光的量子噪声下隐藏密文。对Y00系统的加密强度进行了理论分析和实验分析。然而,关于信息伪造等主动攻击的研究并不多。最近的研究表明,现有的ISK - Y00系统,其通信基础是配对信号,可以防止已知明文攻击下的攻击。为了提高抵御攻击的概率,提出了一种基于四重信号的ISK Y00系统,其信号基为4个信号的集合。研究表明,所提出的系统对每个信号的防范概率为0.66665,而BB84中使用的一次性Pad无法防止已知明文攻击下的消息篡改,因为极性反转直接对消息进行了篡改。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信