Next Article in Journal
Assessment of the Effectiveness of Rehabilitation after Total Knee Replacement Surgery Using Sample Entropy and Classical Measures of Body Balance
Previous Article in Journal
A New Deep Dual Temporal Domain Adaptation Method for Online Detection of Bearings Early Fault
Previous Article in Special Issue
Improved Resource State for Verifiable Blind Quantum Computation
Article

How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?

1
Center of Excellence for Advanced Materials and Sensors, Research Unit Photonics and Quantum Optics, Institute Ruder Bošković, 10000 Zagreb, Croatia
2
Nanooptics, Department of Physics, Humboldt-Universität zu Berlin, 12489 Berlin, Germany
Academic Editors: Xiang-Bin Wang and Nicolò Spagnolo
Entropy 2021, 23(2), 163; https://doi.org/10.3390/e23020163
Received: 18 November 2020 / Revised: 18 January 2021 / Accepted: 20 January 2021 / Published: 29 January 2021
(This article belongs to the Special Issue Quantum Information Processing)
We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual information between the sender and the receiver is always constant and equal to one and messages copied by the eavesdropper are always genuine. An attack can only be detected in the control mode but the level of detection at which the protocol should be aborted is not defined. We examine steps of the protocol to evaluate its security and find that the protocol should be redesigned. We also compare it with the security of a one-way asymmetric BB84-like protocol in which one basis serves as the message mode and the other as the control mode but which does have the level of detection at which the protocol should be aborted defined. View Full-Text
Keywords: quantum cryptography; quantum key distribution; two-way communication quantum cryptography; quantum key distribution; two-way communication
Show Figures

Figure 1

MDPI and ACS Style

Pavičić, M. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Entropy 2021, 23, 163. https://doi.org/10.3390/e23020163

AMA Style

Pavičić M. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Entropy. 2021; 23(2):163. https://doi.org/10.3390/e23020163

Chicago/Turabian Style

Pavičić, Mladen. 2021. "How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?" Entropy 23, no. 2: 163. https://doi.org/10.3390/e23020163

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop