Logo of Humboldt-Universität zu BerlinLogo of Humboldt-Universität zu Berlin
edoc-Server
Open-Access-Publikationsserver der Humboldt-Universität
de|en
Header image: facade of Humboldt-Universität zu Berlin
View Item 
  • edoc-Server Home
  • Artikel und Monographien
  • Zweitveröffentlichungen
  • View Item
  • edoc-Server Home
  • Artikel und Monographien
  • Zweitveröffentlichungen
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
All of edoc-ServerCommunity & CollectionTitleAuthorSubjectThis CollectionTitleAuthorSubject
PublishLoginRegisterHelp
StatisticsView Usage Statistics
All of edoc-ServerCommunity & CollectionTitleAuthorSubjectThis CollectionTitleAuthorSubject
PublishLoginRegisterHelp
StatisticsView Usage Statistics
View Item 
  • edoc-Server Home
  • Artikel und Monographien
  • Zweitveröffentlichungen
  • View Item
  • edoc-Server Home
  • Artikel und Monographien
  • Zweitveröffentlichungen
  • View Item
2021-01-29Zeitschriftenartikel DOI: 10.3390/e23020163
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
Pavičić, Mladen
Mathematisch-Naturwissenschaftliche Fakultät
We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual information between the sender and the receiver is always constant and equal to one and messages copied by the eavesdropper are always genuine. An attack can only be detected in the control mode but the level of detection at which the protocol should be aborted is not defined. We examine steps of the protocol to evaluate its security and find that the protocol should be redesigned. We also compare it with the security of a one-way asymmetric BB84-like protocol in which one basis serves as the message mode and the other as the control mode but which does have the level of detection at which the protocol should be aborted defined.
Files in this item
Thumbnail
entropy-23-00163.pdf — Adobe PDF — 336.4 Kb
MD5: 84caacb61c81e0d56cb76b36e58cf7fa
Notes
This article was supported by the German Research Foundation (DFG) and the Open Access Publication Fund of Humboldt-Universität zu Berlin.
Cite
BibTeX
EndNote
RIS
(CC BY 4.0) Attribution 4.0 International(CC BY 4.0) Attribution 4.0 International
Details
DINI-Zertifikat 2019OpenAIRE validatedORCID Consortium
Imprint Policy Contact Data Privacy Statement
A service of University Library and Computer and Media Service
© Humboldt-Universität zu Berlin
 
DOI
10.3390/e23020163
Permanent URL
https://doi.org/10.3390/e23020163
HTML
<a href="https://doi.org/10.3390/e23020163">https://doi.org/10.3390/e23020163</a>