A REVIEW ON DIFFERENT THREATS ON QUANTUM KEY DISTRIBUTION PROTOCOL

Main Article Content

Chinmoy Ghosh
Amit Parag
Shrayasi Datta

Abstract

Now days the information become the valuable assets and private information must be protected from being compromised. Today we use different sophisticated, robust encryption algorithm which are vulnerable to classical computational attack as well as the powerful parallel quantum computer. In this paper, we examine limitations and vulnerabilities and attacks to which Quantum Key Distribution can be exposed.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Chinmoy Ghosh, JALPAIGURI GOVERNMENT ENGINEERING COLLEGE

Department of Computer Science & Engineering

Shrayasi Datta, JALPAIGURI GOVERNMENT ENGINEERING COLLEGE Department of Information Technology

Department of Information Technology

References

Barton Zwiebach, Quantum Mechanics 2, MIT OCW

Wolfgang Ketterlee, Isaac Chung, Atomic and Optical Physics, MIT OCW.

Kollmitzer, Pivk et al, “Applied Quantum Cryptographyâ€.

D. Mayers, “ Advances in Cryptologyâ€

H. Inamori, N. L¨utkenhaus and D. Mayers, “Unconditional security of practical QKDâ€, The European Physical Journal, Volume 41, Issue 3, pp 599-62, March 2007.

Ling , Gerhardt, Linares, “Full Field Implementation of a perfect Eavesdropper on a quantum cryptography systemâ€, Nature Communications 2, Article number 349, 2012.

C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,†IEEE Systems and Signals Processing, Volume 175, 8, 1984.

L. Lydersen Wikkers, Wittman et al, “Hacking Commercial quantum cryptography systems by tailored Bright illumination†Nature Photonics4, 686–689,2010.

QKD, Wikipedia, https://en.wikipedia.org/wiki/Q_k_d

Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013,edited by Philipe Gaborit.

Nitin Jain, Birgit Stiller, Imran Khan, Vadim Makarov, Christoph Marquardt, Gerd Leuchs, “Trojan-horse attacks Threaten the Security of Practical Quantumâ€, Cryptography,New J. Phys. 16, 123030 (2014).

Zhang, J. Liu, D. Wang and S. Shi "Quantum direct communication with authentication" Phys. Rev. A 75, 026301, 2007

David Miller, “Quantum Mechanics for Scientists and Engineersâ€

Leonard Susskind, “Quantum Entanglement Lecturesâ€

Mart Haitjema, “A Survey of the Prominent Quantum Key Distribution Protocolsâ€.

MIT Ocw, Quantum Mechanics 1

Coursera, Quantum Computation

Lo, Cutry , Tamaki“Secure quantum key distributionâ€, Nature Photonics 8, 595-604, 2014.

Elliott, Colvin. et al., “Current status of the DARPA Quantum Networkâ€, In Proc SPIE, Quantum Information. Computation III, 138 June 02, 2005

Fröhlich, B. et al. “A quantum access networkâ€, Nature 501, 69–72, 05 September 2013

Cao, Zheng et al, “Highly Efficient Quantum Key Distribution Immune to All Detector Attacksâ€, arxiv.org/pdf/1410.2928.

Biham, Boyer ,et al,†Security of Quantum Key Distribution Against All Collective Attacksâ€, Quantum Physics, 12th Jan, 1998, pp 1-5

N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G Ribordy, “Trojan-Horse Attacks on Quantum-Key- Distribution Systemsâ€, Phys. Rev. A 73, 022320 -2006.

Normand J. Beaudry, Marco Lucamarini, Stefano Mancini, Renato Renner, “Security of two-way Quantum key distributionâ€, PHYSICAL REVIEW A 88, 062302 -2013.

Christianson, Bruce , Lecture Notes in Computer Science, 8263

A. Vakhitov, V. Makarov, and D. R. Hjelme, Large Pulse Attack as a Method of Conventional Optical Eavesdropping in Quantum Cryptography, J. Mod. Opt. 48, 2023 (2001).

Stallings, “Cryptography and Network Security.

ETSI - Quantum Key Distribution, http://www.etsi.org/technologies--clusters/technologies/quantum-key-distribution

Feihu Xu, Bing Qi, Hoi-Kwong Lo, “Experimental demonstration of phase-remapping attack in a practical Quantum key distribution systemâ€. New J. Phys. 12, 2010

“Quantum crack in cryptographic armourâ€, Nature News, http://ww w.nature.com/news/2 010/100520/full/ new.256.html

Measurement In Quantum Mechanics , http://en.wikipedia.org/wiki/Measurement_in_ quantum_mechanics.

Thomas Baign`eres, “Quantum Cryptography: On the Security of the BB84 Key-Exchange Protocolâ€.

M.D.Dang and M. Riguldel, “Usage of secure networks built using quantum technologyâ€, 2004

Scarani, Valerio, et al. "The security of practical quantum key distribution." Reviews of modern physics 81.3 (2009): 1301.