Cargando…

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded

An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e., it provides...

Descripción completa

Detalles Bibliográficos
Autores principales: Vergoossen, Tom, Bedington, Robert, Grieve, James A., Ling, Alexander
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514874/
https://www.ncbi.nlm.nih.gov/pubmed/33267101
http://dx.doi.org/10.3390/e21040387
_version_ 1783586689128595456
author Vergoossen, Tom
Bedington, Robert
Grieve, James A.
Ling, Alexander
author_facet Vergoossen, Tom
Bedington, Robert
Grieve, James A.
Ling, Alexander
author_sort Vergoossen, Tom
collection PubMed
description An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e., it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible.
format Online
Article
Text
id pubmed-7514874
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75148742020-11-09 Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded Vergoossen, Tom Bedington, Robert Grieve, James A. Ling, Alexander Entropy (Basel) Article An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e., it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible. MDPI 2019-04-10 /pmc/articles/PMC7514874/ /pubmed/33267101 http://dx.doi.org/10.3390/e21040387 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Vergoossen, Tom
Bedington, Robert
Grieve, James A.
Ling, Alexander
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_full Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_fullStr Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_full_unstemmed Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_short Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded
title_sort satellite quantum communications when man-in-the-middle attacks are excluded
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514874/
https://www.ncbi.nlm.nih.gov/pubmed/33267101
http://dx.doi.org/10.3390/e21040387
work_keys_str_mv AT vergoossentom satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
AT bedingtonrobert satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
AT grievejamesa satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded
AT lingalexander satellitequantumcommunicationswhenmaninthemiddleattacksareexcluded