0509091v3

related topics
{key, protocol, security}
{theory, mechanics, state}
{state, phys, rev}
{measurement, state, measurements}
{algorithm, log, probability}
{light, field, probe}
{force, casimir, field}
{state, algorithm, problem}
{information, entropy, channel}
{state, states, coherent}
{photon, photons, single}
{equation, function, exp}
{particle, mechanics, theory}
{qubit, qubits, gate}
{cos, sin, state}

On the security of AlphaEta: Response to `Some attacks on quantum-based cryptographic protocols'

Horace P. Yuen, Ranjith Nair, Eric Corndorf, Gregory S. Kanter, Prem Kumar

abstract: Lo and Ko in [1] have developed some attacks on the cryptosystem called AlphaEta [2], claiming that these attacks undermine the security of AlphaEta for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrealistic even for moderate key lengths. The second attack is a Grover search attack based on `asymptotic orthogonality' and was not analyzed quantitatively in [1]. We explain why it is not logically possible to ``pull back'' an argument valid only at n=infinity into a limit statement, let alone one valid for a finite number of transmissions n. We illustrate this by a `proof' using a similar asymptotic orthogonality argument that coherent-state BB84 is insecure for any value of loss. Even if a limit statement is true, this attack is a priori irrelevant as it requires an indefinitely large amount of known-plaintext, resources and processing. We also explain why the attacks in [1] on AlphaEta as a key-generation system are based on misinterpretations of [2]. Some misunderstandings in [1] regarding certain issues in cryptography and optical communications are also pointed out. Short of providing a security proof for AlphaEta, we provide a description of relevant results in standard cryptography and in the design of AlphaEta to put the above issues in the proper framework and to elucidate some security features of this new approach to quantum cryptography.

oai_identifier:
oai:arXiv.org:quant-ph/0509091
categories:
quant-ph
comments:
Accepted for publication in QIC; Reset in Journal format; some minor typos and language changes
arxiv_id:
quant-ph/0509091
created:
2005-09-13
updated:
2006-07-12

Full article ▸

related documents
0609094v1
0608199v3
0601130v2
0701168v1
0608030v3
0703099v5
0703069v1
0603234v1
0611145v1
0603135v1
0605041v4
0509211v1
0511163v2
0610096v2
0612016v1
0603024v2
0612052v2
0701091v1
0511219v3
0608156v1
0509189v2
0702155v3
0606017v1
0609160v1
0606242v3