Next Article in Journal
Echo State Condition at the Critical Point
Next Article in Special Issue
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
Previous Article in Journal
A Multivariate Multiscale Fuzzy Entropy Algorithm with Application to Uterine EMG Complexity Analysis
Previous Article in Special Issue
Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators
Open AccessArticle

Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack

Graduate Department, Universidad Politécnica de Pachuca, Carretera Pachuca-Cd. Sahagún, Km. 20, Ex-Hacienda de Santa Bárbara, Municipio de Zempoala, Hidalgo 43830, Mexico
General Management, Cinvestav Querétaro, Libramiento Norponiente 2000, Real de Juriquilla, Santiago de Querétaro, Querétaro 76230, Mexico
Time and Frequency Laboratory, Centro Nacional De Metrología, Carretera a Los Cués Km. 4.5, El Marqués, Santiago de Querétaro, Querétaro 76246, Mexico
Author to whom correspondence should be addressed.
Academic Editor: James J. Park
Entropy 2017, 19(1), 4;
Received: 3 November 2016 / Revised: 15 December 2016 / Accepted: 19 December 2016 / Published: 23 December 2016
Despite the unconditionally secure theory of the Quantum Key Distribution (Q K D), several attacks have been successfully implemented against commercial Q K D systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution protocol as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates (I R F S) attack without requiring additional optical components different from the B B 84 protocol because the system can be implemented as a high software module. In this approach, the transmitter interleaves pairs of quantum states, referred to here as parallel and orthogonal states, while the receiver uses active basis selection. View Full-Text
Keywords: biqubit; double matching; single compatible; detection event biqubit; double matching; single compatible; detection event
Show Figures

Figure 1

MDPI and ACS Style

Lizama-Pérez, L.A.; López, J.M.; De Carlos López, E. Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack. Entropy 2017, 19, 4.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop