Intercept-Resend Attack on SARG04 Protocol: An Extended Work

Authors

  • Ali H. Yousif Department of Information System Engineering, Erbil Technical Engineering College, Erbil Polytechnic University, Erbil, Kurdistan Region, Iraq https://orcid.org/0000-0001-7526-4260
  • Omar S. Mustafa Department of Information System Engineering, Erbil Technical Engineering College, Erbil Polytechnic University, Erbil, Kurdistan Region, Iraq https://orcid.org/0000-0002-2712-7058
  • Dana F. Abdulqadir Department of Information System Engineering, Erbil Technical Engineering College, Erbil Polytechnic University, Erbil, Kurdistan Region, Iraq https://orcid.org/0000-0003-2863-6847
  • Farah S. Khoshaba Department of Information System Engineering, Erbil Technical Engineering College, Erbil Polytechnic University, Erbil, Kurdistan Region, Iraq https://orcid.org/0000-0002-8928-4171

DOI:

https://doi.org/10.25156/ptj.v10n1y2020.pp88-92

Keywords:

Eavesdropper, Intercept-resend, IR, Quantum, SARG04

Abstract

In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is investigated by bounding the information of an eavesdropper; then, the attack has been analyzed. In 2019, simulation and enhancement of the performance of SARG04 protocol have been done by the same research group in terms of error correction stage using multiparity rather than single parity (Omar, 2019). The probability of detecting the case in the random secret key by eavesdropper is estimated. The results of intercept/resend eavesdropper attack proved that the attack has a significant impact on the operation of the SARG04 protocol in terms of the final key length.

Downloads

Download data is not yet available.

References

Anqi, H. 2018. Quantum Hacking in the Age of Measurement Device- Independent Quantum Cryptography. PhD Thesis, UWSpace.

Bennett, C. H. and G. Brassard. 1984. Quantum Cryptography: Public Key Distribution and Coin Tossing. Vol. 1. Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing. p175-179.

Branciard, C., N. Gisin, B. Kraus and V. Scarani. 2005. Security of two quantum cryptography protocols using the same four qubit states. Phys. Rev. A. 72(3): 032301.

Dehmani, M., M. Errahmani and A. Benyoussef. 2012. Quantum key distribution with several intercept-resend attacks via a depolarizing channel. Phys. Script. 86: 015803.

Garapo, K., M. Mafu and F. Petruccione. 2016. Intercept-resend attack on six-state quantum key distribution over collectiverotation noise channels. Chin. Phys. B. 25: 070303.

Hiroo, A. and M. Ban. 2019. The intercept/resend attack and the delayedmeasurement attack on the quantum key distributionprotocol based on the pre and post-selection effect. Quantum Phys. 26: 07282v3.

Hitesh, S., D. L. Gupta and A. K Singh. 2014. Quantum key distribution protocols: A review. IOSR J. Comput. Eng. 16(2): 1-9.

Jabbar, I. A. and I. A. Ahmed. 2013. Proposed a new method for error correction using Multi-Parity instead of single parity in BB84 protocol under different types of attacks. Al-Rafidain Eng. 21: 34-52.

Li, X., H. Wang and Q. Zhao. 2016. An analytical study on eavesdropping attacks in wireless nets of things. Mob. Inf. Syst. 2016: 4313475.

Omar, S. M., A. H. Yousif and D. F. Abdulqadir. 2019. Improving error correction stage and expanding the final key using dynamic linearfeedback shift register in sarg04 protocol. Polytech. J. 9: 1-6.

Scarani, V., A. Acín, G. Ribordy and N. Gisin. 2004. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett.

: 057901.

Tobias, V. 2016. Mobile Free Space Quantum Key Distribution for Short Distance Secure Communication. Master Thesis.

Published

2020-06-30

How to Cite

Yousif, A. H., Mustafa, O. S., Abdulqadir, D. F., & Khoshaba, F. S. (2020). Intercept-Resend Attack on SARG04 Protocol: An Extended Work. Polytechnic Journal, 10(1), 88-92. https://doi.org/10.25156/ptj.v10n1y2020.pp88-92

Issue

Section

Research Articles

Most read articles by the same author(s)