Intercept-resend attack on quantum key distribution protocols with two, three and four-state systems: Comparative analysis

Gabriela Mogos*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

1 Citation (Scopus)

Abstract

The existing studies proved the importance of quantum key distribution protocols,unfortunately, most of them have been known only as theoretical models. Starting from the mathematical models, this study explores quantum alternatives to traditional key distribution protocols and involves software implementations of the quantum key distribution protocols with two, three and four-state systems. The paper presents the results obtained on case of the cybernetic attack simulation, type Intercept-Resend - the well known attack on quantum world, over the each protocol. Presence of the eavesdropper is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Error Rate for detecting the eavesdropper can be applied to the majority key distribution systems, each system having its own acceptable error rate. Starting from the same size of input data, the paper presents an analysis of the data obtained on cybernetic attack simulations and analyzes the percentage of errors by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol.

Original languageEnglish
Title of host publication2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467386111
DOIs
Publication statusPublished - 4 Jan 2016
Externally publishedYes
Event2nd IEEE International Conference on Information Science and Security, ICISS 2015 - Seoul, Korea, Republic of
Duration: 14 Dec 201516 Dec 2015

Publication series

Name2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015

Conference

Conference2nd IEEE International Conference on Information Science and Security, ICISS 2015
Country/TerritoryKorea, Republic of
CitySeoul
Period14/12/1516/12/15

Keywords

  • Quantum key distribution
  • Qubits
  • Ququarts
  • Qutrits

Cite this