### Key distribution & Attack

Title: Cryptanalysis of a Practical Quantum Key Distribution With Polarization-Entangled Photons

Authors: Thomas Beth and Joern Mueller-Quade and Rainer Steinwandt

Comments: 6 pages\\

Recently, a quantum key exchange protocol has been described, which served asbasis for securing an actual bank transaction by means of quantum cryptography[quant-ph/0404115]. Here we show, that the authentication scheme applied isinsecure in the sense that an attacker can provoke a situation where initiatorand responder of a key exchange end up with different keys. Moreover, it mayhappen that an attacker can decrypt a part of the plaintext protected with thederived encryption key.\\

( http://arXiv.org/abs/quant-ph/0407130 , 5kb)

------------------------------------------------------------------------------\Title: A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

Authors: M. Peev, M. N\"olle, O. Maurhardt, T. Lor\"unser, M. Suda, A. Poppe, R. Ursin, A. Fedrizzi and A. Zeilinger

Comments: 4 pages, submitted to the International Journal of Quantum Information, Proceedings of the meeting "Foundations of Quantum Information", Camerino, April 2004\\

In this work we review the security vulnerability of Quantum Cryptographywith respect to "man-in-the-middle attacks" and the standard authenticationmethods applied to counteract these attacks. We further propose a modifiedauthentication algorithm which features higher efficiency with respect toconsumption of mutual secret bits.\\

( http://arXiv.org/abs/quant-ph/0407131 , 8kb)

## 1 Comments:

This comment has been removed because it linked to malicious content. Learn more.

Post a Comment

<< Home