Elsevier

Information Sciences

Volume 178, Issue 8, 15 April 2008, Pages 2044-2058
Information Sciences

Unconditionally secure cryptosystems based on quantum cryptography

https://doi.org/10.1016/j.ins.2007.11.013Get rights and content

Abstract

Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts are critical in supporting the claim that the intended cryptosystem is secure. Most early cryptographic algorithms are based either on factorization or on discrete logarithm problem. Such systems generally adopt rather simple mathematics, and, therefore, need extensive secondary index computation. This study discusses quantum cryptosystems, protection of system security, and optimization of system efficiency. Quantum cryptography detects intrusion and wiretap. In quantum mechanics, a wiretap is neither external nor passive; rather it modifies its entity based on the internal component of the system. The status of the quantum system changes once a wiretap is detected. Hence, only the designer of the system can discover the quantum status of the system; an eavesdropper can neither determine the quantum state nor duplicate the system. The quantum cryptosystem can achieve unconditional security, and thus guarantees secure communication.

Introduction

As computer science rapidly advances, related technologies are also emerging. Computer technology has rapidly improved from the vacuum tube through transistor technology to super-scaled integrated circuits. Recently, the size of transistors in processors has once again been significantly reduced, a phenomenon that is crucial to improve computer mechanics. However, this continuous size reduction cannot continue for long. Transistors that are too small restrict the overall functionality of a computer. Hence, in 1982, Nobel-Prize-winning physicist Richard Feynman [39] proposed the concept of the quantum computer, which exploits the quantum features such as superposition and entanglement.

The most basic structural element of a traditional computer, the bit, can exist in only one of two mutually exclusive states, 0 or 1. However, this rule does not apply in Feynman’s proposed quantum computer. A quantum bit can exist not only in the traditional 0 or 1 state, but also in continuous or overlapping states. A quantum bit that is in continuous or overlapping states can be recognized to be in two domains, namely 0 and 1. However, the operations based on such a quantum bit affects the two values simultaneously, as revealed in Fig. 1. Therefore, operating on a single quantum bit implies working on two values. Similarly, a bi-quantum bit system can work on four values, and a tri-quantum bit system can operate on eight values. Accordingly, as the number of quantum bits rises, the quantum collateral effect obtained from the system is increased by the exponential method.

Although the concept of quantum computers has remained purely theoretical for a long time, recent developments in quantum computers have aroused interest. Shor et al. [38] designed an algorithm that successfully calculated a large amount of data using quantum computers. A quantum computer can utilize this algorithm as a solution to problems based on exponential operations, such as the NP problem [44], [45] or factorization [16]. The temporal cost is much less than that of any conventional computer. Therefore, quantum computer is now increasingly studied with many researchers attempting to produce a practical quantum computer.

While most current cryptographic technologies, such as RSA, DES, ECC and others are based on factorization, discrete logarithms, and other exponential operations, Shor’s algorithm [38] for a quantum computer can efficiently solve the exponential equation problems. Thus, currently available cryptosystems will in comparison become useless and lacking in security [17], [20], [28] when quantum computers become practical reality. Most public key cryptosystems apply simple mathematics that can be hacked easily by scanning for loopholes and backdoors. This weakness is the limitation of modern cryptography. Accordingly, developing an entirely new cryptosystem has become the research goal in various fields [9], [34]. The quantum cryptosystem is one such system.

Wiesner [42] proposed the one-time pad method for key distributions, exploiting the laws of physics to scan for system intrusion or wiretap in the 1970s. A wiretap was identified from an altered quantum state. Quantum mechanics does not regard measurement as an external and passive process, but instead as one that changes the internal states of the system. Detection, wiretaps, and intrusion are measurement behaviors, any wiretap and intrusion during key distribution can be detected. Hence, a quantum cryptosystem attains unconditional security.

Fig. 2 illustrates the quantum cryptosystem structure which employs two main channels of communication. The first is the quantum channel which aims to transmit and receive quantum bits and to generate the session key. The second is the open channel which is adopted by the sender and receiver to compare their quantum bits, and thus discover whether they are being tapped. Both sender and receiver encrypt the plain text and decrypt the cipher text by their session key, thus securing their communication.

System security in a quantum cryptosystem lies in key distribution. A change in the quantum state of the system occurs once an eavesdropper obtains the quantum bits used to compose the session key; the eavesdropper can thus be detected. Therefore, the development of quantum cryptology is devoted to practical and efficient Quantum Key Distribution Protocol (QKDP), which has recently become a major topic in research into quantum mechanics.

Section snippets

Background and related works of quantum cryptology

Wiesner was the first to apply the principles of quantum mechanics to the structure of cryptosystems in the 1970s; he also presented an entirely new vision [42] of cryptography theory and technology in the early 1980s. The ongoing development of quantum cryptosystems thereafter was primarily the result of the efforts of Bennett and Brassard. Most quantum cryptographic key distribution protocols developed during that time were based on Heisenberg’s Uncertainty Principle and Bell’s Inequality,

Two principles used in QKDPs

The Heisenberg’s Uncertainty Principle and the Bell’s Inequality are the two main theorems utilized in the development of QKDPs, and are still widely applied today. Their basic principles and their role in the design of the QKDPs are explained below.

The QKDPs based on Heisenberg’s Uncertainty Principle

The earliest QKDPs utilized Heisenberg’s Uncertainty Principle. The most popular early QKDPs are BB84 proposed by Bennett et al. [11] and B92 [10] presented by Bennett, both of which are described in Sections 4.1.2 BB84 Protocol, 4.1.3 B92 Protocol, respectively.

Conclusions

Although quantum cryptosystems are currently at the experimental stage and are unregulated, its development prospects are quite bright. Workshops are held each year to study and discuss new cryptographic algorithms and key distribution protocols. The practice of the quantum cryptosystem has also seen significant development. Researchers, Townsend of British Telecom Laboratories and Rarity of Christophe Marand, have built an optical fiber cable of around 30 km long; a key exchange process [15]

Acknowledgement

The authors would like to thank the National Science Council, Taiwan, for financially supporting this research under Contract No. NSC 95-2221-E-029-024.

References (45)

  • J. Wang et al.

    Quantum secure direct communication based on order rearrangement of single photons

    Physics Letters A

    (2006)
  • K. Kaya et al.

    Threshold cryptography based on Asmuth–Bloom secret sharing

    Information Sciences

    (2007)
  • M. Demirci et al.

    An introduction to vague complemented ordered sets

    Information Sciences

    (2007)
  • U. Dogrusoz et al.

    On labeling in graph visualization

    Information Sciences

    (2007)
  • W.C.-K. Yen

    The edge-orientation problem and some of its variants on weighted graphs

    Information Sciences

    (2006)
  • A. Beige et al.

    Secure communication with a publicly known key

    Acta Physica Polonica A

    (1999)
  • A.C.-C. Yao, Security of quantum protocols against coherent measurements, in: Proceedings of the 26th Annual ACM...
  • A. Einstein et al.

    Can quantum-mechanical description of physical reality be considered complete?

    Physical Review

    (1935)
  • A.K. Ekert

    Quantum cryptography based on Bell’s Theorem

    Physical Review Letters

    (1991)
  • B. Hutter et al.

    Quantum cryptography with photon pairs

    Journal of Modern Optics

    (1994)
  • B. Hutter et al.

    Quantum cryptography with coherent states

    Physical Review A

    (1995)
  • C.H. Bennett

    Quantum cryptography using any two non-orthogonal states

    Physical Review Letters

    (1992)
  • Cited by (10)

    • A verifiable multi-party quantum key distribution protocol based on repetitive codes

      2022, Information Sciences
      Citation Excerpt :

      Since the quantum key distribution (QKD) protocol with two participants has been gradually improved from theory to experiment [1–8], and it has become matured, scholars have begun to pay attention to the design of multi-party quantum key distribution protocol (M-QKD) due to the requirements of secure operation in practical quantum networks [9–14].

    • Gray code permutation algorithm for high-dimensional data encryption

      2014, Information Sciences
      Citation Excerpt :

      It is with the P-Box processes that serious speed problems arise, since these algorithms need to shuffle the whole message many times, following complex rules and therefore rising the computational cost. Recently, many new secure algorithms which use nontraditional techniques have been developed (see, for instance, [16,9,17,26,4,3]). Some of them are based on discrete chaotic systems [16,9,17], because of the ergodic property and their high sensitivity to initial conditions and parameters they provide both P-Box and S-Box processes with good efficiency and high security.

    View all citing articles on Scopus
    View full text