Photon-number Splitting Attack on SARG04 Protocol
An Extended Work
DOI:
https://doi.org/10.25156/ptj.v10n1y2020.pp157-162Keywords:
Attack, Photon-number splitting, Quantum key distribution, Quantum, SARG04Abstract
Network protection, an essential interest has migrated within this area particularly with the development of hacking, the strategies, as well as the penetration of the most effective blanketed networks. It can be stated that all the methods and protocols applied failed to forestall the intruder’s attacks, consequently many researches grew to favor quantum mechanics over create non-intrusive methods. Many scientists and researchers have introduced other cryptographic subjects in quantum computing which is known as quantum key distribution protocol. In this paper, which is an extension to our preceding work (Mustafa et al., 2019), the simulation of the overall performance of SARG04 protocol had been examined in opposition to the most time-honored attack: Photon-number splitting (PNS) assault in the quantum channel. The data received showed results that obtained high resistance against PNS attack, due to the method that was used in the sifting stage.
Downloads
References
Ali, S., S. Mohammed, M. S. H. Chowdhury. and A. A. Hasan. 2012. Practical SARG04 quantum key distribution. Optic. Quant.
Electron. 44(10-11): 471-482.
Banerjee, A., A. Prabhakar. and R. M. Mathias. 2017. Quantum key distribution-technology review. Defcom India J. Def. Inform. Commun. Technol. 3(1): 1-13.
Grazioso, F. and F. Grosshans. 2013. Photon-number-splitting-attack Resistant Quantum Key Distribution Protocols Without Sifting. arXiv Preprint arXiv:1306.6061. Cornell University, United States.
Haitjema, M. 2007. A survey of the Prominent Quantum Key Distribution Protocols. Available from: https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum.Mart Haitjema,mart. [email protected].
Jabbar, A. I. A. and Ahmed, I.A. 2013. Applying multi-parity code to the quantum security protocol BB84 under different types of attacks-ENG. AL Rafdain Eng. J. 21(5): 34-53.
Lizama-Pérez, L., J. López, D. Carlos-López. and S. Venegas- Andraca. 2014. Quantum flows for secret key distribution in the presence of the photon number splitting attack. Entropy. 16(6): 3121-3135.
Lopes, M. and N. Sarwade. 2015. On the performance of quantum cryptographic protocols SARG04 and KMB09. In: 2015 International Conference on Communication, Information and Computing Technology (ICCICT). IEEE, United States. p1-6.
Mailloux, L. O., D. D. Hodson, M. R. Grimaila, R. D. Engle, C. V. Mclaughlin. and G. B. Baumgartner. 2016. Using modeling and simulation to study photon number splitting attacks. IEEE Access. 4: 2188-2197.
Mustafa, O., A. Yousif. and D. Abdulqadir. 2019. Improving error correction stage and expanding the final key using dynamic linear-feedback shift register in sarg04 protocol. Polytech. J. 9(1): 1-6.
Price, B. A., G. J. Rarity. and C. Erven. 2017. Quantum Key Distribution Without Sifting. 7th International Conference in Quantum Cryptography (QCRYPT), Cambridge, UK.
Singh, H., D. L. Gupta. and A. K. Singh. 2014. Quantum key distribution protocols: A review. J. Comput. Eng. 16(2): 1-9.
Sinil’shchikov, I. V. and S. N. Molotkov. 2019. Decoy states and low-density parity-check error-correcting codes in quantum cryptography with phase-time coding. J. Exp. Theor. Phys. 129(2): 168-196.
Wang, X. B. 2005. Beating the PNS Attack in Practical QKD. Cornell University, New York.
Yin, H. L., Y. Fu, Y. Mao. and Z. B. Chen. 2016. Security of quantum key distribution with multiphoton components. Sci. Rep. 6: 29482.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Dana F. Abdulqadir, Omar S. Mustafa, Ali H. Yousef
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).