You have requested a machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Neither SPIE nor the owners and publishers of the content make, and they explicitly disclaim, any express or implied representations or warranties of any kind, including, without limitation, representations and warranties as to the functionality of the translation feature or the accuracy or completeness of the translations.
Translations are not retained in our system. Your use of this feature and the translations is subject to all use restrictions contained in the Terms and Conditions of Use of the SPIE website.
29 October 2013Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher
This paper presents the physical prevention probability of an Intensity-Shift-Keying (ISK) Y00 quantum stream cipher against a polarity inversion attack, where the attacker in the middle of the communication line intercepts legitimate sender’s messages and resends false messages to the legitimate receiver by inverting some of signal polarities. Message falsification is recognized as a major issue in the field of mathematical encryption. Therefore, the attack should also be studied in the field of physical encryption. Y00 protocol was proposed by H. P. Yuen in 2000 to hide even ciphertexts from eavesdroppers under quantum noise of coherent light. Theoretical and experimental analyses of encryption strength of Y00 systems have also been studied against eavesdropping. However, there were not many studies about active attacks like message falsifications. Recent studies showed that the present ISK Y00 systems, whose communication bases are paired signals, may prevent the attack under the Known-Plaintext-Attack. To enhance the probability against the attack, a quadruple-signal-based ISK Y00 system was proposed, whose signal bases are sets of 4 signals. This study shows the proposed system has a prevention probability of 0.66665 per signal, while One-Time Pad used in BB84 cannot prevent message falsification under Known-Plaintext-Attack since polarity inversion directly falsifies the message.
Takehisa Iwakoshi andOsamu Hirota
"Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher", Proc. SPIE 8899, Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X, 88990M (29 October 2013); https://doi.org/10.1117/12.2029029
The alert did not successfully save. Please try again later.
Takehisa Iwakoshi, Osamu Hirota, "Polarity inversion attack prevention by physical properties of Y00 quantum stream cipher," Proc. SPIE 8899, Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X, 88990M (29 October 2013); https://doi.org/10.1117/12.2029029