Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security

In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the attacker's quantum memory. However, there...

Full description

Bibliographic Details
Main Author: Takehisa Iwakoshi
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8970381/
id doaj-18ca1ae7c42745a4a954b575a9795592
record_format Article
spelling doaj-18ca1ae7c42745a4a954b575a97955922021-03-30T01:13:46ZengIEEEIEEE Access2169-35362020-01-018234172342610.1109/ACCESS.2020.29694558970381Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic SecurityTakehisa Iwakoshi0https://orcid.org/0000-0001-7236-1591Department of Information Engineering, Mie University, Tsu, JapanIn our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the attacker's quantum memory. However, there were several assumptions that the Y00 system utilized linear-feedback shift registers as pseudo-random-number generators, and a fast correlation attack was disabled by irregular mapping on the Y00 systems. This study generalizes such an attack to remove the assumptions of the previous work. The framework of the security analyses of this study reiterates two well-known results from the past: (1) Y00 systems would be cryptanalyzed when the system is not designed well; (2) the system is possibly information-theoretically secure when the system is designed well, although the attacker's confidence in the correct key increases over time but the success probability of key recovery does not reach unity in finite time; (3) the breach probability of the shared keys increases with time. Hence, a key-refreshment procedure for the Y00 protocol is provided herein. Such security analyses are important not only in key refreshment but also in initial key agreement.https://ieeexplore.ieee.org/document/8970381/Information-theoretic securityoptical networkquantum cryptographyquantum detection theorysecure communications
collection DOAJ
language English
format Article
sources DOAJ
author Takehisa Iwakoshi
spellingShingle Takehisa Iwakoshi
Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security
IEEE Access
Information-theoretic security
optical network
quantum cryptography
quantum detection theory
secure communications
author_facet Takehisa Iwakoshi
author_sort Takehisa Iwakoshi
title Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security
title_short Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security
title_full Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security
title_fullStr Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security
title_full_unstemmed Analysis of Y00 Protocol Under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security
title_sort analysis of y00 protocol under quantum generalization of a fast correlation attack: toward information-theoretic security
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2020-01-01
description In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the attacker's quantum memory. However, there were several assumptions that the Y00 system utilized linear-feedback shift registers as pseudo-random-number generators, and a fast correlation attack was disabled by irregular mapping on the Y00 systems. This study generalizes such an attack to remove the assumptions of the previous work. The framework of the security analyses of this study reiterates two well-known results from the past: (1) Y00 systems would be cryptanalyzed when the system is not designed well; (2) the system is possibly information-theoretically secure when the system is designed well, although the attacker's confidence in the correct key increases over time but the success probability of key recovery does not reach unity in finite time; (3) the breach probability of the shared keys increases with time. Hence, a key-refreshment procedure for the Y00 protocol is provided herein. Such security analyses are important not only in key refreshment but also in initial key agreement.
topic Information-theoretic security
optical network
quantum cryptography
quantum detection theory
secure communications
url https://ieeexplore.ieee.org/document/8970381/
work_keys_str_mv AT takehisaiwakoshi analysisofy00protocolunderquantumgeneralizationofafastcorrelationattacktowardinformationtheoreticsecurity
_version_ 1724187451184906240