{"title":"PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation","authors":"Ashutosh Bhatia;Sainath Bitragunta;Kamlesh Tiwari","doi":"10.1109/OJCOMS.2025.3575206","DOIUrl":null,"url":null,"abstract":"The Quantum Key Distribution (QKD) protocol utilizes quantum mechanics principles for cryptographic key exchange, ensuring absolute secrecy. Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent mechanism for identity verification within the quantum channel. For authentication, these systems rely on classical or post-quantum cryptography, which diminishes the perfect security advantage provided by QKD. We present a Physical Unclonable Function (PUF)-based authenticated QKD protocol (PUF-AQKD), which avoids the necessity for authenticated classical channels and is useful in mitigating MITM attacks. The fundamental concept of PUF-AQKD is to implement a phase shift in the basis used for polarizing the transmitted qubits. The phase shift is dictated by PUFs, which are anticipated to result in analogous (correlated) responses for devices manufactured under similar conditions but dissimilar responses in different conditions. An adversary lacking a correlated PUF response shared by Alice and Bob would inadvertently increase the Quantum Bit Error Rates (QBER) observed at Bob’s end. We present a mathematical model to assess the efficacy of the proposed PUF-AQKD method and perform simulations utilizing the NetSquid simulator. The mathematical analysis and simulation findings indicate that PUF-AQKD can efficiently identify eavesdroppers, even during incomplete measurements, without the necessity of an authorized classical channel.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"4923-4942"},"PeriodicalIF":6.3000,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018517","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11018517/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
The Quantum Key Distribution (QKD) protocol utilizes quantum mechanics principles for cryptographic key exchange, ensuring absolute secrecy. Current QKD techniques are susceptible to man-in-the-middle (MITM) attacks due to the absence of an inherent mechanism for identity verification within the quantum channel. For authentication, these systems rely on classical or post-quantum cryptography, which diminishes the perfect security advantage provided by QKD. We present a Physical Unclonable Function (PUF)-based authenticated QKD protocol (PUF-AQKD), which avoids the necessity for authenticated classical channels and is useful in mitigating MITM attacks. The fundamental concept of PUF-AQKD is to implement a phase shift in the basis used for polarizing the transmitted qubits. The phase shift is dictated by PUFs, which are anticipated to result in analogous (correlated) responses for devices manufactured under similar conditions but dissimilar responses in different conditions. An adversary lacking a correlated PUF response shared by Alice and Bob would inadvertently increase the Quantum Bit Error Rates (QBER) observed at Bob’s end. We present a mathematical model to assess the efficacy of the proposed PUF-AQKD method and perform simulations utilizing the NetSquid simulator. The mathematical analysis and simulation findings indicate that PUF-AQKD can efficiently identify eavesdroppers, even during incomplete measurements, without the necessity of an authorized classical channel.
期刊介绍:
The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023.
The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include:
Systems and network architecture, control and management
Protocols, software, and middleware
Quality of service, reliability, and security
Modulation, detection, coding, and signaling
Switching and routing
Mobile and portable communications
Terminals and other end-user devices
Networks for content distribution and distributed computing
Communications-based distributed resources control.