Abstract
Quantum cryptography is proposed as a big revolution in IT security, even some theoretical studies considered that the exploitation of quantum physics features can enable us to get unconditional security. With the passage of time, appeared the quantum cryptanalysis which includes in the beginning a collection of theoretical quantum hacking strategies. However, the implementation of quantum key distribution protocols (QKD) showed several vulnerabilities in quantum cryptography scheme, which exploited to spy on the quantum communication. Therefore, the engineering implementation of QKD protocols showed a significant difference between the theoretical promises and experiment results. In order to make QKD protocols more applicable in real security solutions, we analyze in this contribution the variation of the security level of QKD protocols between the quantum theory and the implementation phase. In the same context, we focus on the quantum attacks via exploiting the vulnerabilities of classical devises using in the implementation phase and these impact on the security level of QKD.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gupta, B. B., Agrawal, D. P., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey: IGI Global.
Gupta, B. B. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (Vol. 666). Boca Raton: CRC Press.
Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE IoT Journal, 6, 1402–1409.
Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future generation computer systems. Amsterdam: Elsevier.
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.
Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.
Gupta, S., & Gupta, B. B. (2017). Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing, 7(3), 1–43.
Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349–357.
Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. International Journal of Cloud Applications and Computing, 7(1), 1–31.
Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems, 83, 596–606.
Bruss, D. (1998). Optimal eavesdropping in quantum cryptography with six states. Physical Review Letters, 81(14), 3018–3021
Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92, 057901.
Qi, B., Fung, C.-H. F, Lo, H.-K., & Ma, X. (2007). Time-shift attack in practical quantum cryptosystems. Quantum Information and Computation, 7, 73–82.
Amellal, H., Meslouhi, A., Hassouni, Y., El Baz, M., & El Allati, A. (2017). Cryptanalysis on a scheme to share information via employing discrete algorithm to quantum states. Journal of the Korean Physical Society, 70, 449–453. https://doi.org/10.3938/jkps.70.449
Amellal, H., Meslouhi, A., Hassouni, Y., & El Allati, A. (2017). SQL injection principle against BB84 protocol. International Journal of Computers and Communications, 11. ISSN: 2074-1294.
Dirac, P. A. M. (1947). The principles of quantum mechanics (3rd ed.). Oxford: Clarendon Press.
Dieks, D. (1982). Communication by EPR devices. Physics Letters A, 92(6), 271–272.
Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., & Weinfurter, H. (2009). Information leakage via side channels in freespace BB84 quantum cryptography. New Journal of Physics, 11, 065001.
Dirac, P. A. M. (1947). The principles of quantum mechanics (3rd ed.). Oxford: Clarendon Press.
Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299, 802–803. https://doi.org/10.1038/299802a0
Lamas-Linares, A., & Kurtsiefer, C. (2007). Breaking a quantum key distribution system through a timing side channel. Optics Express, 15, 9388393.
Lütkenhaus, N. (2000). Security against individual attacks for realistic quantum key distribution. Physics Letters A, 61, 052304.
Makarov, V., & Hjelme, D. R. (2005). Faked states attack on quantum cryptosystems. Journal of Modern Optics, 52, 69105.
Makarov, V. (2009). Controlling passively quenched single photon detectors by bright light. New Journal of Physics, 11, 065003.
Makarov, V., & Skaar, J. (2008). Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK and Ekert protocols. Quantum Information and Computation, 8(67), 92–93.
Makarov, V., Anisimov, A., & Skaar, J. (2006). Effects of detector efficiency mismatch on security of quantum cryptosystems. Physical Review A, 74, 022313.
Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92, 057901.
Bennett, C. H., & Brassard, G. (1984). Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (pp. 71, 79, 92). New York: IEEE Press.
Zhao, Y., Fung, C.-H. F., Qi, B., Chen, C., & Lo, H.-K. (2008). Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Physical Review A, 78, 042333.
Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., & Weinfurter, H. (2009). Information leakage via side channels in freespace BB84 quantum cryptography. New Journal of Physics, 11, 065001.
Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., & Makarov, V. (2010). Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics, 4, 686–689. https://doi.org/10.1038/nphoton.2010.214
El Allati, A., El Baz, M., & Hassouni, Y. (2011). Quantum key distribution via tripartite coherent states. Quantum Information Processing, 10, 5589–5602.
Eleuch, H., & Bennaceur, R. (2004). Nonlinear dissipation and the quantum noise of light in semiconductor microcavities. Journal of Optics B: Quantum and Semiclassical Optics, 6, 189.
Curado, E. M. F., Rego-Monteiro, M. A., Rodrigues, L. M. C. S., & Hassouni, Y. (2006). Coherent states for a degenerate system: The hydrogen atom. Physica A, 371, 16.
Glauber, R. J. (1963). Coherent and incoherent states of the radiation field. Physical Review, 131, 2766 (1963).
Ekert, A. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663.
Greenberger, D., Horne, M. A., & Zeilinger, A. (1989). Going beyond Bell’s theorem. In M. Kafatos (Ed.), Bell’s theorem, quantum theory and conceptions of the universe (Vol. 80, pp. 69–72). Dordrecht: Kluwer.
Li, C., Wang, Z., Wu, C., Song, H. S., & Zhou, L. (2006). Certain quantum key distribution achieved by using Bell states. International Journal of Quantum Information, 4(6), 899–906.
Bennett, C. H. (1992). Quantum cryptography using any two nonorthogonal states. Physical Review Letters, 68, 3121.
Amellal, H., Meslouhiy, A., Hassouni, Y., & El Baz, M. (2015). A quantum optical firewall based on simple quantum devices. Quantum Information Processing, 14, 2617–2633. https://doi.org/10.1007/s11128-015-1002-4
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Amellal, H., Meslouhi, A., Allati, A.E., Haddadi, A.E. (2020). QKD Protocols Security Between Theory and Engineering Implementation. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)