Next Article in Journal
Assessment of the Effectiveness of Rehabilitation after Total Knee Replacement Surgery Using Sample Entropy and Classical Measures of Body Balance
Previous Article in Journal
A New Deep Dual Temporal Domain Adaptation Method for Online Detection of Bearings Early Fault
Previous Article in Special Issue
Improved Resource State for Verifiable Blind Quantum Computation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?

by
Mladen Pavičić
1,2
1
Center of Excellence for Advanced Materials and Sensors, Research Unit Photonics and Quantum Optics, Institute Ruder Bošković, 10000 Zagreb, Croatia
2
Nanooptics, Department of Physics, Humboldt-Universität zu Berlin, 12489 Berlin, Germany
Entropy 2021, 23(2), 163; https://doi.org/10.3390/e23020163
Submission received: 18 November 2020 / Revised: 18 January 2021 / Accepted: 20 January 2021 / Published: 29 January 2021
(This article belongs to the Special Issue Quantum Information Processing)

Abstract

:
We consider a man-in-the-middle attack on two-way quantum key distribution ping-pong and LM05 protocols in which an eavesdropper copies all messages in the message mode, while being undetectable in the mode. Under the attack there is therefore no disturbance in the message mode and the mutual information between the sender and the receiver is always constant and equal to one and messages copied by the eavesdropper are always genuine. An attack can only be detected in the control mode but the level of detection at which the protocol should be aborted is not defined. We examine steps of the protocol to evaluate its security and find that the protocol should be redesigned. We also compare it with the security of a one-way asymmetric BB84-like protocol in which one basis serves as the message mode and the other as the control mode but which does have the level of detection at which the protocol should be aborted defined.
PACS:
03.67.Dd; 03.67.Ac; 42.50.Ex

1. Introduction

Quantum cryptography, in particular quantum key distribution (QKD) protocols, offers us, in contrast to the classical one, provably unbreakable communication based on the quantum physical properties of the information carriers [1,2,3]. So far, implementations were mostly based on the one-way BB84 protocol [4] which is unconditionally secure provided the quantum bit error rate (QBER) is low enough. However, QBER in BB84-like protocols might be high and since we cannot discriminate eavesdropper’s (Eve’s) bit flips from bit flips caused by noise in the line, the request of having QBER low enough for processing the bits is often difficult to satisfy. e.g., 4-state BB84 with more than 0.11 [5] and 6-state BB84 [6] with more than 0.126 [5] disturbances (D) have to be aborted (D is defined as the amount of polarization-flips caused by Eve, the maximum being 0.5). D includes the inherent QBER as well as possible Eve in the line. If Eve were the only cause of D, the mutual information between the sender (Alice) and Eve ( I A E ) wound surpass the one between Alice and the receiver (Bob) ( I A B ): I A E > I A B for D > 0.11 , 0.126 , respectively.
Protocols using two-way quantum communications have also been proposed. Since they are less efficient versions of BB84 protocols, they have no meaningful advantage. Here we show that the security of some two-way protocols is vulnerable under a man-in-the-middle (MITM) attack. In particular, entangled photon two-way protocols based on two [7] (also called a ping-pong (pp) protocol) and four ( Ψ , Φ ) [8] Bell states, on the one hand and a single photon deterministic Lucamarini–Mancini (LM05) protocol, on the other [9,10]. Several varieties, modifications, and generalisations of the latter protocol are given in [11,12,13,14]. Two varieties were implemented in [15,16]. The former pp protocol was implemented by Ostermeyer and Walenta in 2008 [17] while the protocol with four Bell states cannot be implemented with linear optics elements [18,19]. In the aforementioned references various security estimations have been obtained.
In [20] Lu, Fung, Ma, and Cai provide a security proof of an LM05 deterministic QKD for the kind of attack proposed in [9,10]. Nevertheless, they claim it to be a proof of the unconditional security of LM05. In [21] Han, Yin, Li, Chen, Wang, Guo, and Han provide a security proof for a modified pp protocol and prove its security against collective attacks in noisy and lossy channel.
All previous elaborations of the security of two-way protocols assume that Eve attacks each signal twice, once on the way from Bob to Alice, and later on its way back from Alice to Bob, and that in doing so she disturbs the signal in the message mode.
However, there is another attack in which an undetectable Eve encodes Bob’s signals by mimicking Alice’s encoding of a decoy signal sent to her which we elaborate on in this paper. We consider the two-way deterministic QKD protocols under a MITM attack where, Eve—undetectable in the message mode (MM)—can acquire all the messages, meaning that there is no disturbance in the MM ( D MM ) at all. In the control mode (CM) there is a disturbance ( D CM ), but there is no critical D at which Alice and Bob should abort the protocol. The only way to delete bits of the raw key snatched by Eve is via privacy amplification and for disturbances close to D CM = 0.5 , when Eve is in the line all time, it seems impossible to distinguish whether Eve has or has not obtained the whole key. In order to verify that conjecture, we prove that the security proof carried out in [20] does not cover a MITM attack and that therefore cannot be called “unconditional”.
We also compare two-way protocols under a MITM attack with a recent one-way asymmetric BB84-like protocol [22] in which the { | 0 , | 1 } basis serves as MM and the { | ± } basis as CM, under a MITM attack. The latter protocol resolves the problem of absence of inherent critical disturbance by introducing a predetermined threshold disturbance after which Alice and Bob abort the protocol. This makes the protocol conditionally secure and we propose a similar solution for the two-way protocols.
In Section 2 we present the protocols and MITM attacks on them. In Section 3 we discuss the security of two-way protocols and analyze their proof of unconditional security; we also compare properties of two-way protocols with those of the standard BB84 and the aforementioned asymmetrical BB84-like one. In Section 4 we present some concluding points and a summary of the results achieved in the paper.

2. Protocols and Attacks on Them

Ping-pong (pp) protocol is based on two Bell states [7]. Bob prepares entangled photons in one of the Bell states, sends one of the photons to Alice while keeping the other one in a quantum memory (qm). Alice either returns the photon as is or acts on it so as to put both photons into another Bell states. Bob combines the photon he receives from Alice with the one he kept in qm at a beam splitter (BS) to decode Alice’s messages. The messages are said to be sent in message mode (MM). There is also a control mode (CM) in which Alice measures Bob’s photon and announces her outcomes over a public channel.
The Bell basis used in the pp protocol consists of two Bell states
| Ψ = 1 2 ( | H 1 | V 2 | V 1 | H 2 ) ,
where | H i ( | V i ), i = 1 , 2 , represent horizontal (vertical) polarized photon states.
Photon pairs in the state | Ψ are generated by a down-converted entangled photon source. To send | Ψ state Alice just returns her photon to Bob. To send | Ψ + she puts a half-wave plate ( HWP ( 0 ) ) in the path of her photon. The HWP changes the sign of the vertical polarization.
At Bob’s BS the photons in state | Ψ will split and those in state | Ψ + will bunch together.
Eavesdropper Eve carries out an MITM, designed by Nguyen [23], as follows. She puts Bob’s photon in a qm (delays it in the fiber coil) and makes use of a copy of Bob’s device to send Alice a photon from a down-converted pair in state | Ψ as shown in Figure 1a. When Eve receives the photon from Alice she combines it with the other photon from the pair and determines the Bell state in the same way Bob would. She uses this result to generate the same Bell state for Bob by putting the appropriate HWPs in the path of Bob’s photon.
Thus, Eve is able to copy every single message in the MM undetectably and therefore sending messages in the MM is equivalent to sending plain text “secured” by the CM.
In the LM05 protocol [9,24] Bob prepares a qubit in one of the four states | 0 , | 1 (the Pauli Z eigenstates), | + , or | (Pauli X eigenstates) and sends it to his counterpart Alice. In the MM she modifies the qubit state by applying either I , which leaves the qubit unchanged and encodes the logical 0, or by applying i Y = Z X , which flips the qubit state and encodes the logical 1. ( i Y | 0 = | 1 , i Y | 1 = | 0 , i Y | + = | , i Y | = | + .) Alice now sends the qubit back to Bob who measures it in the same basis in which he prepared it and deterministically infers Alice’s operations, i.e., her messages, without basis reconciliation procedure.
Eavesdropper Eve carries out a MITM, designed by Lucamarini ([24], p. 61, Figure 5.5), as follows. As shown in Figure 1b. Eve delays Bob’s photon (qubit) in a fiber spool (a quantum memory) and sends her own decoy photon in one of the four states | 0 , | 1 , | + , or | to Alice, instead. Alice encodes her message via I or i Y and sends the photon back. Eve measures it in the same basis in which she prepared it, reads off the message, encodes Bob’s delayed photon via I , if she read 0, or via i Y , if she read 1, and sends it back to Bob.
Eve never learns the states in which Bob sent his photons but that is irrelevant in MM since only polarization flipping or not flipping encode messages. Alice also need not know Bob’s states [9]. Eve could only be revealed in CM in which Alice carries out a projective measurement of the qubit along a basis randomly chosen between Z and X , prepares a new qubit in the same state as the outcome of the measurement, sends it back to Bob, and reveals this over a classical public channel [9].

3. Security of the Protocols

To reach the main point of the paper, let us first discuss the one-way asymmetric (aBB84) and symmetric (sBB84, i.e., standard BB84) protocols.
A recent definition of aBB84 [25] reads: “Alice [asks her] entanglement-based source to [randomly] prepare quantum states in two bases, X = { | 0 , | 1 } and Z = { ( | 0 + | 1 ) / 2 , ( | 0 | 1 ) / 2 } ... Bob [randomly] measure[s] quantum systems in [these two] bases... The protocol is asymmetric [meaning that] the number of bits measured in the two bases (n bits in the X basis and k bits in the Z basis) are not necessarily equal [26]... Sifting: Alice and Bob broadcast their basis choices over the classical channel... Error correction: (EC) A reconciliation scheme that broadcasts [chosen] bits of classical error correction data is applied. Bob compute[s] an estimate Y ^ of the raw key string Y . Alice computes universal 2 hash function of Y [and] sends [it] to Bob. If the hash[es] of Y ^ and Y disagree, the protocol aborts. Privacy amplification: (PA) Alice extracts l bits of secret key S from Y using a random universal 2 hash function. The choice of function is communicated to Bob, who uses it to calculate S .” ([25], p. 3) There are other similar definitions of aBB84 in the literature [26,27,28,29,30].
When n = k , aBB84 turns into sBB84, i.e., it becomes identical to the original BB84. In what follows, when not explicitly stated otherwise, under BB84 we mean sBB84.
What is essential for the standard aBB84 and sBB84, is that Eve cannot avoid introducing disturbance (D). Specifically, when Alice sends messages in X and Z bases, Eve cannot avoid introducing D. E.g., Alice sends | 1 in X basis, Eve reads it as ( | 0 + | 1 ) / 2 in Z basis and resends it to Bob who, say in X basis, reads it either as | 0 or as | 1 . If the former, it will be discarded in the EC procedure, if the latter, it will be accepted as a valid message. As for Eve, no public information can enable her to find out what Bob actually measured hence she loses information.
However, Alice and Bob lose their information too, and as shown in Figure 2a in a BB84 protocol, when the level of disturbance approaches D MM = 0.11 (the MM is the only mode of the standard BB84 protocol) the mutual information between Alice and Eve I A E approaches the mutual information between Alice and Bob I A B and they have to abort the protocol. Note that I A B = 1 + D log 2 D + ( 1 D ) log 2 ( 1 D ) and I A E = D log 2 D ( 1 D ) log 2 ( 1 D ) [31] and that, ideally, for D MM < 0.11 , EC can eliminate all errors induced by Eve and that PA can remove all key bits Eve might have collected, no matter how close to 0.11 D MM is. This is so because both I A B and I A E are functions of D MM , i.e., functions of the disturbance in the message mode for which the mutual information in the very same message mode is calculated. The closer D MM is to 0.11, the more difficult is for Alice and Bob, after PA, to extract the secure key from the raw key, since the former becomes smaller and smaller. “The efficiency of privacy amplification rapidly decreases when [ D MM ] increases” ([32], p. 165, mid right column). “At D MM = 0.11 the secure-key length formally vanishes” ([33], p. 524). See also [31].
For a MITM attack on two-way protocols (which are without any sifting), when Eve is in the line all the time, there is no D MM that Eve induces and the mutual information between Alice and Bob as well as between Alice and Eve is equal to unity: I A B = 1 . In Figure 2b D CM indicates the presence of Eve, where D CM = 0.5 would mean that Eve is always in the line. For D CM slightly below D CM = 0.5 one cannot exclude the possibility that Eve has all the messages.
When Eve has all the messages then there is no Alice-Bob “privacy” they could amplify. When Eve snatches only a portion of messages, then, for D CM close to 0.5, there is still a question whether Eve has all messages or not and whether Alice and Bob can erase Eve’s messages with their PA. With that in mind, we can examine the security evaluation for the MITM and verify whether the proofs of unconditional security carried out for other kind of attack on LM05 in [10,20] might apply to it as well.
In the aforementioned security proof [20], which is claimed to be unconditional, the authors assume that Eve probes the qubit, entangling it with an ancilla. However, their approach does not cover the MITM attacks. To show this we point to the following steps in their proof of unconditional security vs. two-way-protocol-under-MITM counter-steps:
[20]
p. 2, 2nd paragraph from the top: “Alice announces partial of her key bits in the encoding mode [MM]. They compute the error rate e in the Alice–Bob channel.”
MITM
I A B = 1 and Eve does not induce any error in the MM, ever.
[20]
p. 2, Sec. III.A: “Eve cannot gain any information about Alice’s key bits if she only attacks the qubits after Alice’s encoding operation.”
MITM
Since Eve in her MITM sends her own photons to Alice and then reads off I or i Y from Alice’s encoding of those qubits, Eve gains all information from Alice’s qubits, more precisely, from Eve’s qubits encoded by Alice. Note the neither Alice nor Eve know which states the qubits Bob sends are in. They only control I and i Y .
[20]
Eve’s most general quantum operation can be described by a unitary operation together with an ancilla. In the Bob–Alice channel, when Bob sends a qubit in state | 0 and Alice measures in the basis | 0 , | 1 , she will get the measurement outcomes | 0 with probability c 00 2 or | 1 with probability c 01 2 .
MITM
Alice does not measure qubits. She just applies I and i Y .
[20]
Eve’s most general attack (with ancillas) is
U B E | 0 B | E = c 00 | 0 B | E 00 + c 01 | 1 B | E 01 , U B E | 1 B | E = c 11 | 1 B | E 11 + c 10 | 0 B | E 10 ,
U B E | + B | E = c + + | + B | E + + + c + | B | E + , U B E | B | E = c | B | E + + c + | + B | E + .
Fidelities are f 0 = c 00 2 , f 1 = c 11 2 , f + = c + + 2 , and f = c 2 . f 0 = f 1 and f = f + are assumed...
Bob’s qubit is in a mixed state ρ B = ( | 0 0 | + | 1 1 | ) / 2 . The joint state of the forward qubit and Eve’s ancilla becomes ρ B A B E = U B E ( ρ B | E E | ) U B E . Alice’s encoded qubit together with Eve’s ancillas is: ρ A B E = 1 2 | 0 0 | A ρ B A B E + 1 2 | 1 1 | A Y B ρ B A B E Y B ...
The asymptotic key generation rate is r = lim m k ( m ) m , where m is the size of the raw key and k ( m ) is the number of the final key bits. Alice sends Bob EC information over a classical channel so that he can correct his raw key to match Alice’s.
MITM
Eve does not induce any disturbance, so there is no EC.
[20]
The final key is then derived by applying two-universal hashing to their common raw key as PA. The secure key rate r PA for secret key generation is bounded by the conditional entropy of Alice and Bob’s key bits given the quantum information of Eve about the key bits r PA = S ( ρ A | ρ B E ) = t r ρ A B E log 2 ρ A B E + tr ρ B E log 1 ρ B E = 1 h ( ξ ) , where ξ = c + + 2 c 1 2 , c 1 = c 01 = c 10 , and h ( x ) = x log 2 x ( 1 x ) log 2 ( 1 x ) is the binary Shannon entropy. In particular, if Eve does not attack the forward qubits in the Bob-Alice channel, i.e., f 0 = f 1 = f + = f = 1 , one can find that r PA ( ξ ) = 1 . This states that Eve cannot gain any information about Alice’s key bits if she does not attack the travel qubit in the Bob–Alice channel first. Consider the case that Eve measures each forward qubit in the Bob-Alice channel in the basis | 0 , | 1 . Alice and Bob can verify that f 0 = f 1 = 1 , and f + = f = 1 2 . In this case, we have r PA ( ξ ) = 0 . On the other hand, Eve can also measure each forward qubit in the Bob-Alice channel in the basis | + , | , which gives f + = f = 1 and f 0 = f 1 = 1 2 , and thus r PA ( ξ ) = 0 . That is, Eve can gain full information of Alice’s key bits if she has exactly known the forward states before Alice’s encoding operations.
MITM
Eve does not measure qubits (or ancillas). When she is in the line all the time, she just reads off I and i Y Alice executed on her qubits and applies them to Bob’s qubits she stored, i.e., she copies the whole key—both sides have the whole key. There is no privacy which can be amplified. That means we have r PA = 1 , not 0. This deserves a clarification. r PA = lim m k ( m ) m = 1 states that the secret key is equivalent to the raw key in the infinite limit for both Alice and Bob and Eve, what corresponds to I A B = I A E ( D M a x CM ) = 1 , for D M a x CM = 0.5 . So, k PA ( m ) should not be used as a secret key, but that does not mean that we can infer k PA ( m ) = 0 . After PA both parties have the same r PA = 1 and discarding k PA ( m ) does not turn r PA to zero. Discarding the key is based on Alice and Bob’s estimation from the CM, i.e., from outside of the MM space of calculation. The way of calculating k PA ( m ) so as to include discarding of estimated bits both parties might possess should follow from an adequately elaborated PA procedure and its algorithms. A starting step should be a predefined D M a x CM < 0.5 and its inclusion in the protocol via I M a x A E = I A E ( D M a x CM ) . That would give us a conditional security of the protocol.
Taken together, the analysis carried out in [20] is applicable and correct for the attacks on two-way protocols in which Eve reads off the states of qubits with the help of ancillas but is inapplicable to MITM attacks. Therefore, their proof is not universal, i.e., cannot be considered unconditional.
Can Alice and Bob still achieve reliable security of their two-way protocol? To answer this let us first compare one-way (e.g., BB8) and two-way protocols.
Under standard attacks on one way protocols, Eve is left with less and less information about the key when she approaches the critical disturbance D c r i t MM = 0.11 , i.e., the messages she snatches end up scrambled, up to 50% of the time. However, Eve also scrambles Bob and Alice’s messages so that after PA, half of the messages are deleted and half coincide. So, neither party is left with any usable bit.
In two-way protocols under MITM it is different. Eve does not scramble Bob and Alice’s messages at all at higher and higher values of D CM and the longer she is in the line the more messages she copies; for D M a x CM = 0.5 their secret keys are identical and no bare PA (hashing only) can change that.
However, with two-way protocols, when Eve is not in the line all the time, Alice and Bob carry out the PA, guided by the level of disturbance, i.e., the error rate in the CM. The standard PA uses a binary string of obtained messages to produce a new shorter strings via universal hashing. Alice randomly chooses a (permutation) function f : { 0 , 1 } m { 0 , 1 } k ( m ) among some universal 2 class of functions. She then sends both f ( x ) and a description of f to Bob via universal hashing. After computing f ( y ) , where y is his corresponding string, Bob checks whether it agrees with f ( x ) . If it does, a basic property of universal hashing allows them to assume that x = y ([34], p. 214).
The problem emerges with this version of the PA, i.e., with algorithms it makes use of, because Alice and Bob should be able to estimate the length k ( m ) of the secure key with respect to the length of the raw key m which would guarantee them that Eve is not in possession of a single bit of k ( m ) , but via their bare (“blind”) PA they always get x = y , i.e., they do not have a benchmark for estimating the amount of bits Eve lost. The PA procedures elaborated in the literature do not help since they are made for one-way protocols (BB84, B92, etc.) and are rather involved and intricate—c.f. [35]. We have not found a PA procedure elaborated for two-way protocols in the literature. What makes it challenging is the asymptotic approach of I A E ( D CM ) to I A B = 1 shown in Figure 2b, which is absent in the BB84 protocol—see Figure 2a, on the one hand, and the high D, on the other. Whether we can find an efficient PA algorithm for two-way protocols remains to be seen.
A special kind of an aBB84-like protocol in which the X basis serves as MM and Z as CM proposed by Bunandar et al. [22] can help us to better understand the problem of unlimited D. We call the protocol a message-control-(a)symmetric BB84 (mcasBB84) protocol. In Table 1 we compare the properties of the BB84, two-way, and mcasBB84 protocols under MITM attacks.
Let us consider a MITM attack on mcasBB84 (mcasBB84-MITM) which Eve carries out so as to measure and resend all qubits in the X basis. Since Eve receives only | 0 and | 1 messages and resends them unchanged, she does not introduce any disturbance in the MM and I A B = 1 . Eve’s I A E rises with her increased presence in the line. If she were in the line all the time, we would have D CM = 0.5 and I A E = 1 . However, the protocol does not allow that. Instead, it predetermines a threshold value D p d CM and if D CM > D p d CM Alice and Bob will abort it as specified by Bunandar et al. ([22], p. 7). The protocol is an adaptation of the three-state aBB84 protocol which makes use of both X and Z bases for MM as in the standard BB84 only with two additional decoy settings put forward by Lim, Curty, Walenta, Xu and Zbinden [36] which itself builds on other decoy-state pioneering methods as, e.g., the one proposed by Wang [37]. The idea of a predetermined threshold value D p d CM is taken over from [30]. D p d CM serves [22] to calculate a conditional security. The calculation determines which maximal D p d CM is acceptable for an implementation. Apart from solving two-way-protocol maximal D problem, the mcasBB84-MITM has another big advantage (with respect to exponential attenuation of photons in optical fibres) that its photons cover the same distance as the original BB84 (L), i.e., half the distance LM05 photons cover (2L) and a quarter of the distance pp photons cover (4L).

4. Conclusions

To summarize, we considered man-in-middle (MITM) attacks on two kinds of two-way QKD protocols (pp with entangled photons and LM05 with single photons) in which an undetectable Eve can decode all the messages in the message mode (MM) and showed that the mutual information between Alice and Bob is not a function of disturbance in the MM, since there is no disturbance in the MM, but is equal to unity no matter whether Eve is in the line or not. Eve induces a disturbance ( D CM ) only in the control mode (CM). In a way, Alice’s sending of the key is equivalent to sending an unencrypted plain text (via photons obtained by and returned to Bob) secured by an indicator of Eve’s presence. That burdens the protocols with the following drawbacks under a MITM attack:
  • the photons must cover the double distance than in an equivalent one-way BB84-like protocol (mcasBB84) which also has analogous MM and CM modes;
  • while the BB84 protocol is unconditionally secure, and its revised version, the macasBB84 protocol proposed recently is only conditionally secure, the proof of unconditional security of the LM05 protocol given in [20] is not valid, as shown in details in Section 3; the mcasBB84 protocol has a predetermined threshold value of the CM disturbance ( D p d C M ) at which Bob and Alice must abort the protocol whilst the considered two-way protocols do not have such a critical CM disturbance at which to abort the protocol;
  • since there are no errors in the MM mode, the privacy amplification (PA) is the only way to establish the security of the protocols and again in contrast to the mcasBB84 no PA procedures for the two-way protocols have been provided in the literature;
Let us elaborate on these point in the reverse order.
In the two-way protocols the mutual information between Alice and Bob is always greater than or equal to the one between Alice and Eve. When they are equal, i.e., when Eve is in the line all the time, then Alice and Bob and Eve have identical messages and there is no privacy which can be amplified and PA cannot erase key bits Eve has snatched. For a D CM < 0.5 , but close to 0.5, Alice and Bob do not have a procedure and algorithms to obtain the secret key of which Eve possess almost all bits. Note that I A E ( D CM ) approaches I A E = 1 asymptotically and that a maximal D C M after which Alice and Bob have to abort the protocol is not defined.
This is related to our analysis (in Section 3) of the security proof given in [20] which the authors call unconditional. In the analysis in Section 3 we show that their proof does not cover the man-in-the-middle attack (MITM) and that therefore cannot be called “unconditional.”
To better understand the problem of absence of a maximal tolerable D CM (after which Alice and Bob have to abort the protocol) in two-way protocols, in Section 3 we compare protocol with a newly proposed one-way asymmetric BB84-like protocol [22] (mcasBB84) in which X basis serves as MM and Z basis as CM under a MITM attack (mcasBB84-MITM). We show that mcasBB84-MITM without defined maximal D CM would be completely equivalent to two-way protocols under MITM. However, the mcasBB84 protocol resolves the problem of a maximal D CM by means of a predetermined threshold value D p d CM . When D CM > D p d CM Alice and Bob abort the protocol ([22], p. 7). The security calculated for such D p d CM ([22], pp. 7–10), i.e., an elaborated PA procedure, can be called a “conditional security.” An additional advantage (with respect to exponential attenuation of photons in optical fibres) of mcasBB84 is that photons do not travel from Bob to Alice and back to Bob, but only from Alice to Bob (see Table 1).
A similar solution for two-way protocols would be to redesign the protocol so as to either calculate a critical D c r i t CM at which Alice and Bob would be able to erase all bits Eve might have possessed via privacy amplification (PA) or to predetermine threshold value of the disturbance in the CM, D p d CM , for which PA calculations might be carried out. The former calculation, if possible, would provide us with an unconditionally security and the latter one would provide us with a conditional security of the protocols. How to do either of the calculations is an open question, but we conjecture that the former calculation is not feasible.

Funding

Supported by the Ministry of Science and Education of Croatia through the Center of Excellence for Advanced Materials and Sensing Devices (CEMS) funding, and by MSE grants Nos. KK.01.1.1.01.0001 and 533-19-15-0022. Computational support was provided by the cluster Isabella of the Zagreb University Computing Centre and by the Croatian National Grid Infrastructure (CRO-NGI). Financial supports by the Alexander von Humboldt Foundation as well as by the German Research Foundation (DFG) and the Open Access Publication Fund of Humboldt-Universität zu Berlin are acknowledged.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Elliott, C.; Colvin, A.; Pearson, D.; Pikalo, O.; Schlafer, J.; Yeh, H. Current Status of the DARPA Quantum Network. In SPIE Quantum Information and Computation III; Donkor, E.J., Pirich, A.R., Brandt, H.E., Eds.; Proceedings of SPIE; SPIE: Bellingham, WA, USA, 2005; Volume 5815, pp. 138–149. [Google Scholar]
  2. Sasaki, M.; Fujiwara, M.; Ishizuka, H.; Klaus, W.; Wakui, K.; Takeoka, M.; Tanaka, A.; Yoshino, K.; Nambu, Y.; Takahashi, S.; et al. Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 2011, 19, 10387–10409. [Google Scholar] [CrossRef] [PubMed]
  3. Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J.F. The SECOQC Quantum Key Distribution Network in Vienna. New J. Phys. 2009, 11, 075001. [Google Scholar]
  4. Bennett, C.H.; Brassard, G. Quantum Cryptography, Public Key Distribution and Coin Tossing. In International Conference on Computers, Systems & Signal Processing, Bangalore, India, 10–12 December 1984; IEEE: New York, NY, USA, 1984; pp. 175–179. [Google Scholar]
  5. Scarani, V.; Bechmann-Pasquinucci, H.; Cerf, N.J.; Dušek, M.; Lütkenhaus, N.; Peev, M. The Security of Practical Quantum Key Distribution. Rev. Mod. Phys. 2009, 81, 1301–1350. [Google Scholar] [CrossRef] [Green Version]
  6. Bruß, D. Optimal Eavesdropping in Quantum Cryptography with Six States. Phys. Rev. Lett. 1998, 81, 3018–3021. [Google Scholar] [CrossRef] [Green Version]
  7. Boström, K.; Felbinger, T. Deterministic Secure Direct Communication Using Entanglement. Phys. Rev. Lett. 2002, 89, 187902. [Google Scholar] [CrossRef] [Green Version]
  8. Cai, Q.; Li, B. Improving the Capacity of the Boström-Felbinger Protocol. Phys. Rev. A 2004, 69, 054301. [Google Scholar] [CrossRef] [Green Version]
  9. Lucamarini, M.; Mancini, S. Secure Deterministic Communication without Entanglement. Phys. Rev. Lett. 2005, 94, 140501. [Google Scholar] [CrossRef] [Green Version]
  10. Beaudry, N.J.; Lucamarini, M.; Mancini, S.; Renner, R. Security of Two-Way Quantum Key Distribution. Phys. Rev. A 2013, 88, 062302. [Google Scholar]
  11. Henao, C.I.; Serra, R.M. Practical Security Analysis of Two-Way Quantum-Key-Distribution Protocols Based on Nonorthogonal States. Phys. Rev. A 2015, 92, 052317. [Google Scholar] [CrossRef] [Green Version]
  12. Khir, M.A.; Zain, M.M.; Bahari, I.; Suryadi; Shaari, S. Implementation of Two Way Quantum Key Distribution Protocol with Decoy State. Opt. Commun. 2012, 285, 842–845. [Google Scholar]
  13. Shaari, J.S.; Mancini, S. Finite Key Size Analysis of Two-Way Quantum Cryptography. Entropy 2015, 17, 2723–2740. [Google Scholar] [CrossRef] [Green Version]
  14. Pirandola, S.; Mancini, S.; Lloyd, S.; Braunstein, S.L. Continuous-Variable Quantum Cryptography Using Two-Way Quantum Communication. Nat. Phys. 2008, 4, 726–730. [Google Scholar] [CrossRef] [Green Version]
  15. Cerè, A.; Lucamarini, M.; Di Giuseppe, G.; Tombesi, P. Experimental Test of Two-Way Quantum Key Distribution in the Presence of Controlled Noise. Phys. Rev. Lett. 2006, 96, 200501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Kumar, R.; Lucamarini, M.; Giuseppe, G.D.; Natali, R.; Mancini, G.; Tombesi, P. Two-Way Quantum Key Distribution at Telecommunication Wavelength. Phys. Rev. A 2008, 77, 022304. [Google Scholar] [CrossRef]
  17. Ostermeyer, M.; Walenta, N. On the Implementation of a Deterministic Secure Coding Protocol Using Polarization Entangled Photons. Opt. Commun. 2008, 281, 4540–4544. [Google Scholar] [CrossRef] [Green Version]
  18. Lütkenhaus, N.; Calsamiglia, J.; Suominen, K.A. Bell Measurements for Teleportation. Phys. Rev. A 1999, 59, 3295–3300. [Google Scholar] [CrossRef] [Green Version]
  19. Vaidman, L.; Yoran, N. Methods for Reliable Teleportation. Phys. Rev. A 1999, 59, 116–125. [Google Scholar] [CrossRef] [Green Version]
  20. Lu, H.; Fung, C.H.F.; Ma, X.; Cai, Q.Y. Unconditional Security Proof of a Deterministic Quantum Key Distribution with a Two-Way Quantum Channel. Phys. Rev. A 2011, 84, 042344. [Google Scholar] [CrossRef] [Green Version]
  21. Han, Y.G.; Yin, Z.Q.; Li, H.W.; Chen, W.; Wang, S.; Guo, G.C.; Han, Z.F. Security of Modified Ping-Pong Protocol in Noisy and Lossy Channel. Sci. Rep. 2007, 4, 4936. [Google Scholar] [CrossRef] [Green Version]
  22. Bunandar, D.; Lentine, A.; Lee, C.; Cai, H.; Long, C.M.; Boynton, N.; Martinez, N.; DeRose, C.; Chen, C.; Grein, M.; et al. Metropolitan Quantum Key Distribution with Silicon Photonics. Phys. Rev. X 2018, 8, 021009. [Google Scholar]
  23. Nguyen, B.A. Quantum Dialogue. Phys. Lett. A 2004, 328, 6–10. [Google Scholar] [CrossRef]
  24. Lucamarini, M. Quantum Decoherence and Quantum Cryptography. Ph.D. Thesis, University of Rome La Sapienza, Rome, Italy, 2003. [Google Scholar]
  25. Tomamichel1, M.; Lim, C.C.W.; Gisin, N.; Renner, R. Tight finite-key analysis for quantum cryptography. Nat. Commun. 2012, 3, 1–6. [Google Scholar] [CrossRef] [PubMed]
  26. Lo, H.; Chau, H.F.; Ardehali, M. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security. J. Cryptol. 2005, 82, 133–166. [Google Scholar] [CrossRef] [Green Version]
  27. Scarani, V.; Renner, R. Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way Postprocessing. Phys. Rev. Lett. 2008, 100, 200501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  28. Cai, R.Y.Q.; Scarani, V. Finite-Key Analysis for Practical Implementations of Quantum Key Distribution. New J. Phys. 2009, 11, 045024. [Google Scholar] [CrossRef] [Green Version]
  29. Zhou, C.; Bao, W.S.; Li, H.W.; Wang, Y.; Fu, X.Q. Key-Leakage Evaluation of Authentication in Quantum Key Distribution with Finite Resources. Quantum Inf. Process. 2014, 13, 935–955. [Google Scholar] [CrossRef]
  30. Mizutani, A.; Curty, M.; Ci, C.; Lim, W.; Imoto, N.; Tamaki, K. Finite-Key Security Analysis of Quantum Key Distribution with Imperfect Light Sources. New J. Phys. 2015, 17, 093011. [Google Scholar]
  31. Fuchs, C.A.; Gisin, N.; Griffiths, R.B.; Niu, C.S.; Peres, A. Optimal Eavesdropping in Quantum Cryptography. I. Information Bound and Optimal Strategy. Phys. Rev. A 1997, 56, 1163–1172. [Google Scholar] [CrossRef] [Green Version]
  32. Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum Cryptography. Rev. Mod. Phys. 2002, 74, 145–195. [Google Scholar] [CrossRef] [Green Version]
  33. Molotkov, S.N.; Timofeev, A.V. Explicit Attack on the Key in Quantum Cryptography (BB84 Protocol) Reaching the Theoretical Error Limit Qc ≈ 11%. JETP Lett. 2007, 85, 524–525. [Google Scholar] [CrossRef]
  34. Bennett, C.H.; Brassard, G.; Crépeau, C.; Maurer, U.M. Generalized Privacy Amplification. IEEE Trans. Inf. Theory 1995, 41, 1915–1923. [Google Scholar] [CrossRef] [Green Version]
  35. Renner, R.; König, R. Universally Composable Privacy Amplification Against Quantum Adversaries. In Theory of Cryptography; 2nd Theory of Cryptography Conference (TCC 2005), Cambridge, MA, USA, 10–12 February 2005; Kilian, J., Ed.; Chapter Quantum Cryptography and Universal Composability; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3378, pp. 407–425. [Google Scholar]
  36. Lim, C.C.W.; Curty, M.; Walenta, N.; Xu, F.; Zbinden, H. Concise Security Bounds for Practical Decoy-State Quantum Key Distribution. Phys. Rev. A 2014, 89, 022307. [Google Scholar] [CrossRef] [Green Version]
  37. Wang, X.B. Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography. Phys. Rev. Lett. 2005, 94, 230503. [Google Scholar] [CrossRef] [PubMed] [Green Version]
Figure 1. (a) Nguyen’s attack [23] by which Eve is able to deterministically (and undetectably in the message mode (MM)) copy every one of the Bell-state messages in the ping-pong (pp) protocol [7]; (b) Lucamarini’s attack ([24], p. 61, Figure 5.5) by which Eve is able to deterministically (and undetectably in the MM) copy every message in the LM05 protocol; (c) common schematics of both attacks; the green dashed line shows the path of photons when Eve is not in the line.
Figure 1. (a) Nguyen’s attack [23] by which Eve is able to deterministically (and undetectably in the message mode (MM)) copy every one of the Bell-state messages in the ping-pong (pp) protocol [7]; (b) Lucamarini’s attack ([24], p. 61, Figure 5.5) by which Eve is able to deterministically (and undetectably in the MM) copy every message in the LM05 protocol; (c) common schematics of both attacks; the green dashed line shows the path of photons when Eve is not in the line.
Entropy 23 00163 g001
Figure 2. Mutual information plots for (a) one-way protocol BB84; (b) two-way protocols with either pp entangled Bell states or with LM05-like single photon states under a MITM attack; (c) one-way asymmetric BB84-like protocol, in which one basis serves as MM and the other as CM, under a MITM attack (mcasBB84-MITM); I A E c stands for I A E ( D p d CM ) .
Figure 2. Mutual information plots for (a) one-way protocol BB84; (b) two-way protocols with either pp entangled Bell states or with LM05-like single photon states under a MITM attack; (c) one-way asymmetric BB84-like protocol, in which one basis serves as MM and the other as CM, under a MITM attack (mcasBB84-MITM); I A E c stands for I A E ( D p d CM ) .
Entropy 23 00163 g002
Table 1. Properties of a symmetric BB84-like protocol under an arbitrary attack compared with properties of pp, LM05, and  asymmetric mcasBB84 protocols under MITM. For the pp and LM05 protocols D < 0.5 means that Eve is in the line only a portion of the time and D = 0.5 that she is in the line all the time. D p d CM is a predetermined threshold value of D < 0.5 for the mcasBB84-MITM [22] protocol.
Table 1. Properties of a symmetric BB84-like protocol under an arbitrary attack compared with properties of pp, LM05, and  asymmetric mcasBB84 protocols under MITM. For the pp and LM05 protocols D < 0.5 means that Eve is in the line only a portion of the time and D = 0.5 that she is in the line all the time. D p d CM is a predetermined threshold value of D < 0.5 for the mcasBB84-MITM [22] protocol.
BB84ppLM05mcasBB84-MITM
mode(s)MMMM + CMMM + CMMM + CM
disturbance 0 D MM 0.5 D MM = 0
0 D CM 0.5
D MM = 0
0 D CM 0.5
D MM = 0
0 D CM D p d CM
maximal disturbance D c r i t i c a l MM = 0.11 ?? D p d CM
securefor D MM < 0.11 for D CM < ? for D CM < ? for D CM < D p d CM
mutual information I A B ( D MM ) , I A E ( D MM ) I A B = 1
0 I A E ( D CM ) < 1
I A B = 1
0 I A E ( D CM ) < 1
I A B = 1
0 I A E ( D CM ) < I A E ( D p d CM )
photon distanceL4L2LL
trans-mittance T T 4 T 2 T
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Pavičić, M. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Entropy 2021, 23, 163. https://doi.org/10.3390/e23020163

AMA Style

Pavičić M. How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? Entropy. 2021; 23(2):163. https://doi.org/10.3390/e23020163

Chicago/Turabian Style

Pavičić, Mladen. 2021. "How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?" Entropy 23, no. 2: 163. https://doi.org/10.3390/e23020163

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop