How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
dc.contributor.author | Pavičić, Mladen | |
dc.date.accessioned | 2021-03-11T17:13:07Z | |
dc.date.available | 2021-03-11T17:13:07Z | |
dc.date.issued | 2021-01-29 | none |
dc.date.updated | 2021-02-03T22:48:19Z | |
dc.identifier.uri | http://edoc.hu-berlin.de/18452/23193 | |
dc.description | This article was supported by the German Research Foundation (DFG) and the Open Access Publication Fund of Humboldt-Universität zu Berlin. | none |
dc.description.abstract | We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual information between the sender and the receiver is always constant and equal to one and messages copied by the eavesdropper are always genuine. An attack can only be detected in the control mode but the level of detection at which the protocol should be aborted is not defined. We examine steps of the protocol to evaluate its security and find that the protocol should be redesigned. We also compare it with the security of a one-way asymmetric BB84-like protocol in which one basis serves as the message mode and the other as the control mode but which does have the level of detection at which the protocol should be aborted defined. | eng |
dc.description.sponsorship | Humboldt-Universität zu Berlin | |
dc.description.sponsorship | CEMS, Ruder Boskovic Institute, Zagreb, Croatia | |
dc.language.iso | eng | none |
dc.publisher | Humboldt-Universität zu Berlin | |
dc.rights | (CC BY 4.0) Attribution 4.0 International | ger |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.subject | quantum cryptography | eng |
dc.subject | quantum key distribution | eng |
dc.subject | two-way communication | eng |
dc.subject.ddc | 510 Mathematik | none |
dc.title | How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? | none |
dc.type | article | |
dc.identifier.urn | urn:nbn:de:kobv:11-110-18452/23193-4 | |
dc.identifier.doi | 10.3390/e23020163 | none |
dc.identifier.doi | http://dx.doi.org/10.18452/22570 | |
dc.type.version | publishedVersion | none |
local.edoc.pages | 10 | none |
local.edoc.type-name | Zeitschriftenartikel | |
local.edoc.container-type | periodical | |
local.edoc.container-type-name | Zeitschrift | |
dc.description.version | Peer Reviewed | none |
dc.identifier.eissn | 1099-4300 | |
dcterms.bibliographicCitation.journaltitle | Entropy | none |
dcterms.bibliographicCitation.volume | 23 | none |
dcterms.bibliographicCitation.issue | 2 | none |
dcterms.bibliographicCitation.articlenumber | 163 | none |
dcterms.bibliographicCitation.originalpublishername | MDPI | none |
dcterms.bibliographicCitation.originalpublisherplace | Basel | none |
bua.import.affiliation | Pavičić, Mladen; Center of Excellence for Advanced Materials and Sensors, Research Unit Photonics and Quantum Optics, Institute Ruder Bošković, 10000 Zagreb, Croatia, mpavicic@irb.hr; Nanooptics, Department of Physics, Humboldt-Universität zu Berlin, 12489 Berlin, Germany, mpavicic@irb.hr | none |
bua.department | Mathematisch-Naturwissenschaftliche Fakultät | none |