On the security of Y-00 under fast correlation and other attacks on the key
From MaRDI portal
Publication:620794
DOI10.1016/J.PHYSLETA.2006.12.033zbMATH Open1203.81053arXivquant-ph/0608028OpenAlexW2080355820WikidataQ62039360 ScholiaQ62039360MaRDI QIDQ620794FDOQ620794
Authors: Horace P. Yuen, Ranjith Nair
Publication date: 20 January 2011
Published in: Physics Letters. A (Search for Journal in Brave)
Abstract: The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410. In this paper, we show how this weakness can be eliminated with a proper design of ENC. In particular, we present a Y-00 configuration that is more secure than AES under known-plaintext attack. It is also shown that under any ciphertext-only attack, full information-theoretic security on the Y-00 seed key is obtained for any ENC when proper deliberate signal randomization is employed.
Full work available at URL: https://arxiv.org/abs/quant-ph/0608028
Recommendations
- Security of Y-00 under heterodyne measurement and fast correlation attack
- Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol
- Fast correlation attacks on certain stream ciphers
- Fast correlation attacks on nonlinear filter generators
- Optimal correlation attack on the multiplexer generator
Cites Work
Cited In (5)
- Security of Y-00 under heterodyne measurement and fast correlation attack
- Modifying YCN key assignment scheme to resist the attack from Hwang
- Comment on: ``Exposed-key weakness of \(\alpha \eta \) [Phys. Lett. A 370 (2007) 131]
- Exposed-key weakness of \(\alpha \eta \)
- Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol
This page was built for publication: On the security of Y-00 under fast correlation and other attacks on the key
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q620794)