Development of Quantum Protocol Modification CSLOE-2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84

被引:1
|
作者
Cherckesova, Larissa, V [1 ]
Safaryan, Olga A. [1 ]
Beskopylny, Alexey N. [2 ]
Revyakina, Elena [1 ]
机构
[1] Don State Tech Univ, Dept Cyber Secur Informat Syst, Rostov On On 344003, Russia
[2] Don State Tech Univ, Dept Transport Syst, Fac Rd & Transport Syst, Rostov Na Donu 344003, Russia
关键词
quantum protocol; quantum cryptography; quantum key distribution; error threshold; modification of the quantum protocol BB84; TELEPORTATION; INFORMATION; SECURITY;
D O I
10.3390/electronics11233954
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum cryptography protocols make it possible not only to ensure the protection of data transmitted in a communication channel from unauthorized access by intruders, but also to detect the existence of any attempted interception. This scientific direction is currently relevant, since it is related to the problem of security and data protection in current information and communication networks. The article is devoted to quantum cryptography; it describes the development of quantum protocols as quantum key distribution systems. Grounded on the laws of quantum mechanics, the elaboration of modifications of secure data transfer protocols is shown. The authors considered the best-known protocol to be BB84 of quantum key distribution; a more modern modification of this protocol is BB84 Info-Z. Comparative analysis of these has also been carried out. It has been established that the BB84-Info-Z quantum protocol works more efficiently than BB84 since its lower error threshold allows the interceptor to obtain much less information about the secret key. The authors put forward a new idea to improve the BB84 protocol (which has been quite outdated for almost 40 years), due to the increase in modern requirements for quantum cryptography protocols. The modification is called CSLOE-2022. It enables significant intensification of cryptographic strength and the entanglement degree of the interceptor (cryptanalyst), which greatly complicates the very possibility of intercepting information. The ultimate goal of the CSLOE-2022 modification is to complicate the eavesdropping process so much that it can be considered completely useless for an attacker in terms of wasting time and resources. The modification allows exceeding the known speed limit of key generation without repeaters since it uses two sources, the phases of which, in addition to the hundreds of kilometers of fiber between them, are very difficult to stabilize. Comparison of the protocols by working distance showed that for BB84, this distance does not exceed 70 km; for BB84-Info-Z it is similar, at no more than 70 km, and the modification of CSLOE-2022 proposed by the authors theoretically allows increasing the working distance of the quantum protocol to 511 km (7.3 times).
引用
收藏
页数:19
相关论文
共 50 条
  • [21] Simulation algorithm on the quantum BB84 protocol based on Monte Carlo method in classical computer environment
    Jian Li
    Leilei Li
    Hengji Li
    Na Wang
    Xiubo Chen
    Yuguang Yang
    Quantum Information Processing, 2020, 19
  • [22] Modified BB84 quantum key distribution protocol robust to source imperfections
    Pereira, Margarida
    Currás-Lorenzo, Guillermo
    Navarrete, Álvaro
    Mizutani, Akihiro
    Kato, Go
    Curty, Marcos
    Tamaki, Kiyoshi
    arXiv, 2022,
  • [23] How decoherence affects the security of BB84 quantum key distribution protocol
    Okula, Robert
    Mironowicz, Piotr
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [24] Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator
    Fiorini, Francesco
    Pagano, Michele
    Garroppo, Rosario Giuseppe
    Osele, Antonio
    FUTURE INTERNET, 2024, 16 (08)
  • [25] Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol
    Spekkens, RW
    Rudolph, T
    QUANTUM INFORMATION & COMPUTATION, 2002, 2 (01) : 66 - 96
  • [26] Entropy estimates for individual attacks on the BB84 protocol for quantum key distribution
    Myers, JM
    Wu, TT
    Pearson, D
    QUANTUM INFORMATION AND COMPUTATION II, 2004, 5436 : 36 - 47
  • [27] A GAME THEORETIC APPROACH TO STUDY THE QUANTUM KEY DISTRIBUTION BB84 PROTOCOL
    Houshmand, Mahboobeh
    Houshmand, Monireh
    Mashhadi, Habib Rajabi
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (04) : 1133 - 1146
  • [28] A SECURE METHOD OF COMMUNICATION THROUGH BB84 PROTOCOL IN QUANTUM KEY DISTRIBUTION
    Anilkumar, Chunduru
    Lenka, Swathi
    Neelima, N.
    Sathishkumar, V. E.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 25 - 33
  • [29] Game Theory based View to the Quantum Key Distribution BB84 Protocol
    Houshmand, Mahboobeh
    Houshmand, Monireh
    Mashhadi, Habib Rajabi
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 332 - 336
  • [30] Modified BB84 quantum key distribution protocol robust to source imperfections
    Pereira, Margarida
    Curras-Lorenzo, Guillermo
    Navarrete, Alvaro
    Mizutani, Akihiro
    Kato, Go
    Curty, Marcos
    Tamaki, Kiyoshi
    PHYSICAL REVIEW RESEARCH, 2023, 5 (02):