Analysis of Y00 Protocol under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security

01/30/2020
by   Takehisa Iwakoshi, et al.
0

In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the attacker's quantum memory. However, there were several assumptions that the Y00 system utilized linear-feedback shift registers as pseudo-random-number generators, and a fast correlation attack was disabled by irregular mapping on the Y00 systems. This study generalizes such an attack to remove the assumptions of the previous work. The framework of the security analyses of this study reiterates two well-known results from the past: (1) Y00 systems would be cryptanalyzed when the system is not designed well; (2) the system is possibly information-theoretically secure when the system is designed well, although the attacker's confidence in the correct key increases over time but the success probability of key recovery does not reach unity in finite time; (3) the breach time of the shared keys is increasingly threatened with time. Hence, a key-refreshment procedure for the Y00 protocol is provided herein. Such security analyses are important not only in key refreshment but also in initial key agreement situations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/14/2019

Potentially Information-theoretic Secure Y00 Quantum Stream Cipher with Limited Key Lengths beyond One-Time Pad

The previous work showed that the Y00 protocol could stay secure with th...
research
12/11/2022

Cryptanalysis and designing chaos-based irreversible and parallel key expansion module over Galois field

From the security criteria of irreversibility, parallelizability and ind...
research
05/12/2020

An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers

It has been established that quantum algorithms can solve several key cr...
research
11/09/2017

Security of Quantum Key Distribution from Attacker's View

In 2005, trace distance between an ideal quantum state to be distributed...
research
12/24/2021

Overview of Quantum Key Distribution Technique within IPsec Architecture

Quantum Key Distribution (QKD) is an approach for establishing symmetric...
research
07/05/2023

A Scheme to resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher

In LFSR-based stream ciphers, the knowledge of the feedback equation of ...

Please sign up or login with your details

Forgot password? Click here to reset