On the security of Y-00 under fast correlation and other attacks on the key
From MaRDI portal
Publication:620794
Abstract: The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410. In this paper, we show how this weakness can be eliminated with a proper design of ENC. In particular, we present a Y-00 configuration that is more secure than AES under known-plaintext attack. It is also shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any ENC when proper deliberate signal randomization is employed.
Recommendations
- Security of Y-00 under heterodyne measurement and fast correlation attack
- Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol
- Fast correlation attacks on certain stream ciphers
- Fast correlation attacks on nonlinear filter generators
- Optimal correlation attack on the multiplexer generator
Cites work
Cited in
(5)- Security of Y-00 under heterodyne measurement and fast correlation attack
- Modifying YCN key assignment scheme to resist the attack from Hwang
- Comment on: ``Exposed-key weakness of \(\alpha \eta \) [Phys. Lett. A 370 (2007) 131]
- Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol
- Exposed-key weakness of \(\alpha \eta \)
This page was built for publication: On the security of Y-00 under fast correlation and other attacks on the key
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q620794)