On the security of αη: response to 'some attacks on quantum-based cryptographic protocols'

  • Authors:
  • Horace P. Yuen;Ranjith Nair;Eric Corndorf;Gregory S. Kanter;Prem Kumar

  • Affiliations:
  • Center for Photonic Communication & Computing, Department of Electrical Engineering & Computer Science, Department of Physics & Astronomy, Northwestern University, Evanston, IL;Center for Photonic Communication & Computing, Department of Electrical Engineering & Computer Science, Department of Physics & Astronomy, Northwestern University, Evanston, IL;Center for Photonic Communication & Computing, Department of Electrical Engineering & Computer Science, Department of Physics & Astronomy, Northwestern University, Evanston, IL;Center for Photonic Communication & Computing, Department of Electrical Engineering & Computer Science, Department of Physics & Astronomy, Northwestern University, Evanston, IL;Center for Photonic Communication & Computing, Department of Electrical Engineering & Computer Science, Department of Physics & Astronomy, Northwestern University, Evanston, IL

  • Venue:
  • Quantum Information & Computation
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Lo and Ko in [1] have developed some attacks on the cryptosystem called αη [2], claimingthat these attacks undermine the security of αη for both direct encryption and keygeneration. In this paper, we show that their arguments fail in many different ways.In particular, the first attack in [1] requires channel loss or length of known-plaintextthat is exponential in the key length and is unrealistic even for moderate key lengths.The second attack is a Grover search attack based on 'asymptotic orthogonality' andwas not analyzed quantitatively in [1]. We explain why it is not logically possible to"pull back" an argument valid only at n = ∞ into a limit statement, let alone one validfor a finite number of transmissions n. We illustrate this by a 'proof' using a similarasymptotic orthogonality argument that coherent-state BB84 is insecure for any value ofloss. Even if a limit statement is true, this attack is a priori irrelevant as it requires anindefinitely large amount of known-plaintext, resources and processing. We also explainwhy the attacks in [1] on αη as a key-generation system are based on misinterpretations of[2]. Some misunderstandings in [1] regarding certain issues in cryptography and opticalcommunications are also pointed out. Short of providing a security proof for αη, weprovide a description of relevant results in standard cryptography and in the designof αη to put the above issues in the proper framework and to elucidate some securityfeatures of this new approach to quantum cryptography.