CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"

被引:5
|
作者
Lin Ching-Ying [1 ]
Hwang, Tzonelih [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan 70101, Taiwan
关键词
quantum asymmetric cryptography; symmetric key; CNOT extraction attack;
D O I
10.1007/s11433-013-5290-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys. This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT (CNOT) extraction attack. A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.
引用
收藏
页码:1001 / 1003
页数:3
相关论文
共 50 条
  • [11] A comparative survey of symmetric and asymmetric key cryptography
    Chandra, Sourabh
    Paira, Smita
    Alam, Sk Safikul
    Sanyal, Goutam
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 83 - 93
  • [12] Multilayer symmetric and asymmetric technique for audiovisual cryptography
    Aryan Parekh
    Mayav Antani
    Kartik Suvarna
    Ramchandra Mangrulkar
    Meera Narvekar
    Multimedia Tools and Applications, 2024, 83 : 31465 - 31503
  • [13] Symmetric and Asymmetric Cryptography on the Special Linear Cracovian Quasigroup
    Lipinski, Zbigniew
    Mizera-Pietraszko, Jolanta
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2022, PT II, 2022, 13758 : 643 - 655
  • [14] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [15] Concatenation of Keys in Quantum Cryptography: How Quantum Entanglement "Penetrates to" Classical Devices
    Molotkov, S. N.
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2018, 127 (04) : 627 - 637
  • [16] Concatenation of Keys in Quantum Cryptography: How Quantum Entanglement “Penetrates to” Classical Devices
    S. N. Molotkov
    Journal of Experimental and Theoretical Physics, 2018, 127 : 627 - 637
  • [17] Quantum Cryptography and Chaos for the transmission of security keys in 802.11 networks
    Rostom, Rabiha
    Bakhache, Bacem
    Salami, Hassan
    Awad, Abir
    2014 17TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE (MELECON), 2014, : 350 - 356
  • [18] Double CNOT attack on "Quantum key distribution with limited classical Bob"
    Lin, Po-Hua
    Hwang, Tzonelih
    Tsai, Chia-Wei
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2019, 17 (02)
  • [19] On a simple attack, limiting the range transmission of secret keys in a system of quantum cryptography based on coding in a sub-carrier frequency
    Klimov, A. N.
    Kulik, S. P.
    Molotkov, S. N.
    Potapova, T. A.
    LASER PHYSICS LETTERS, 2017, 14 (03)
  • [20] Cnot circuit extraction for topologically-constrained quantum memories
    Kissinger, Aleks
    MEIJER-VAN DE GRIEND, Arianne
    2020, Rinton Press Inc. (20): : 7 - 8