Monday, July 19, 2004

Key distribution & Attack

Title: Cryptanalysis of a Practical Quantum Key Distribution With  Polarization-Entangled Photons
Authors: Thomas Beth and Joern Mueller-Quade and Rainer Steinwandt
Comments: 6 pages\\ 
 Recently, a quantum key exchange protocol has been described, which served asbasis for securing an actual bank transaction by means of quantum cryptography[quant-ph/0404115]. Here we show, that the authentication scheme applied isinsecure in the sense that an attacker can provoke a situation where initiatorand responder of a key exchange end up with different keys. Moreover, it mayhappen that an attacker can decrypt a part of the plaintext protected with thederived encryption key.\\
( http://arXiv.org/abs/quant-ph/0407130 ,  5kb)
------------------------------------------------------------------------------\Title: A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle  Attack in Quantum Cryptography
Authors: M. Peev, M. N\"olle, O. Maurhardt, T. Lor\"unser, M. Suda, A. Poppe,  R. Ursin, A. Fedrizzi and A. Zeilinger
Comments: 4 pages, submitted to the International Journal of Quantum  Information, Proceedings of the meeting "Foundations of Quantum Information",  Camerino, April 2004\\ 
 
In this work we review the security vulnerability of Quantum Cryptographywith respect to "man-in-the-middle attacks" and the standard authenticationmethods applied to counteract these attacks. We further propose a modifiedauthentication algorithm which features higher efficiency with respect toconsumption of mutual secret bits.\\
( http://arXiv.org/abs/quant-ph/0407131 ,  8kb)

1 Comments:

At 19 January 2006 at 22:07, Blogger Marian said...

This comment has been removed because it linked to malicious content. Learn more.

 

Post a Comment

<< Home