首页> 外文会议>Industrial Automation and Electromechanical Engineering Conference >Quantum Computation of Perfect Time-Eavesdropping in Position-Based Quantum Cryptography--Quantum Computing and Eavesdropping over Perfect Key Distribution
【24h】

Quantum Computation of Perfect Time-Eavesdropping in Position-Based Quantum Cryptography--Quantum Computing and Eavesdropping over Perfect Key Distribution

机译:Quantum计算基于位置的Quantum加密 - 量子计算和完美密钥分布窃听的量子计算

获取原文

摘要

In this paper, we proposed the Implementation of Perfect Time Eavesdropping in Position Based Quantum Cryptography. The Security of Quantum Key Distribution lies in the Laws of Quantum Mechanics and is recognized to be one of the most secure cryptography ever known. The major advantage of Position-Based Key Distribution is that an authenticated server or device will be able to use its InterSpace Positions while authenticating in an environment while exchanging a secure key for communication over the network. In Position Cryptography the Authentication is done by verifying that a particular Device holds a definite and fixed position in Space-Time. In this paper, we proposed the experimental Time-Based Attack which evolved as modern day Decoy-Fake Shift Attack. The key idea is: an Attacker Eve can change the Shift of the Key randomly to T1 or T2 with the probability of shift, F and G= 1-F respectively. Also, the attacker can Authenticate and Randomize the Probability F in such a way so that it ensures the Receiver's Detection Ratio is constant i.e. 1:1. So, as a result, the two parties communicating via a secure Quantum channel will not be able to detect the Eavesdropping caused by the attacker and therefore the attacker can have an Authentication over the shared key and can, therefore, the parties will not be able to conceal its information. Thus the secure Position Quantum Cryptography can be broken by this proposed Architecture model. In this paper, we represented the Architecture Model experimentally and the Security Analysis for such an attack has been proposed.
机译:在本文中,我们建议在基于位置的量子密码术中实现完美的时间窃听。量子密钥分布的安全性在于量子力学规律,被认为是最安全的密码学之一。基于位置的密钥分配的主要优点是经过认证的服务器或设备将能够在在环境中进行身份验证时使用其步骤位置,同时交换通过网络进行通信的安全键。在位置加密中,通过验证特定设备在时空中保持确定的位置和固定位置来完成身份验证。在本文中,我们提出了一种基于实验时间的攻击,它发展为现代诱饵转移攻击。关键的想法是:攻击者eve可以随机将钥匙的偏移变为T1或T2,分别偏移F和G = 1-F。此外,攻击者可以以这样的方式进行认证和随机化概率F,以使其确保接收器的检测比是常数的.1:1。因此,因此,通过安全量子通道通信的两方将无法检测到攻击者引起的窃听,因此攻击者可以通过共享密钥进行身份验证,因此,各方将无法进行身份验证隐瞒其信息。因此,通过该建议的架构模型可以破坏安全位置量子密码术。在本文中,我们代表了实验架构模型,提出了这种攻击的安全分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号