TY - GEN
T1 - Intercept-resend attack on quantum key distribution protocols with two, three and four-state systems
T2 - 2nd IEEE International Conference on Information Science and Security, ICISS 2015
AU - Mogos, Gabriela
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/1/4
Y1 - 2016/1/4
N2 - The existing studies proved the importance of quantum key distribution protocols,unfortunately, most of them have been known only as theoretical models. Starting from the mathematical models, this study explores quantum alternatives to traditional key distribution protocols and involves software implementations of the quantum key distribution protocols with two, three and four-state systems. The paper presents the results obtained on case of the cybernetic attack simulation, type Intercept-Resend - the well known attack on quantum world, over the each protocol. Presence of the eavesdropper is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Error Rate for detecting the eavesdropper can be applied to the majority key distribution systems, each system having its own acceptable error rate. Starting from the same size of input data, the paper presents an analysis of the data obtained on cybernetic attack simulations and analyzes the percentage of errors by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol.
AB - The existing studies proved the importance of quantum key distribution protocols,unfortunately, most of them have been known only as theoretical models. Starting from the mathematical models, this study explores quantum alternatives to traditional key distribution protocols and involves software implementations of the quantum key distribution protocols with two, three and four-state systems. The paper presents the results obtained on case of the cybernetic attack simulation, type Intercept-Resend - the well known attack on quantum world, over the each protocol. Presence of the eavesdropper is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Error Rate for detecting the eavesdropper can be applied to the majority key distribution systems, each system having its own acceptable error rate. Starting from the same size of input data, the paper presents an analysis of the data obtained on cybernetic attack simulations and analyzes the percentage of errors by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol.
KW - Quantum key distribution
KW - Qubits
KW - Ququarts
KW - Qutrits
UR - http://www.scopus.com/inward/record.url?scp=84964643005&partnerID=8YFLogxK
U2 - 10.1109/ICISSEC.2015.7371010
DO - 10.1109/ICISSEC.2015.7371010
M3 - Conference Proceeding
AN - SCOPUS:84964643005
T3 - 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
BT - 2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 14 December 2015 through 16 December 2015
ER -