Ijca Volume1 26
Ijca Volume1 26
Volume 1 – No. 26
2. QUANTUM CRYPTOGRAPHY(QC)
Quantum cryptography was first proposed in 1984 by Brennet
and Brassard [2] based on the No-Cloning theorem. They proposed
that this way of sending messages could prove to be the most secure
because the eavesdropper cannot read or clone the bits as it would
change the state the photons polarization thus raising an alarm. The
crucial part of quantum computation is that the quantum system has
“qubits” which not only has two states i.e. „0‟ or „1‟ but also a
superposition of both. The SECOQC White paper of 2007 has
proved past regret that QKD is a reliable courier.The following Figure 1: Diagrammatic representation of the quantum session
steps are done for a QKD session
59
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 26
But consider the following example. Alice needs to send a leads to changes in the polarization of the photon which leads to
letter to Bob. He must make sure that: misinterpretation by Bob.
60
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 26
atmosphere is non-birefringent in optical wavelengths. Still there of the photon in the polarization defined by the measurement
are many more implementation problems that are needed to be results obtained for the amplitudes. A particularly simple cloning
considered.Some of which are scheme could thus be realized by measuring the complex
amplitudes of the input photon and modulating a coherent laser
i) The background radiation rejection and the non-birefringent beam to emit multiple photons with the same polarization
atmosphere work only for normal atmospheric conditions. One amplitudes.The schematic figure of the optimal cloning set-up is
cannot expect such conditions throughout the year. The main shown in the following figure.[10]
challenge is that the above method does not give secure and
reliable communication for all weather conditions.
Furthermore, till date the maximum possible distance that has been
demonstrated is 10Km in day light and 23Km in the night (In Free
Space).The main parameters such as the quantum physics
implementation maturity, classical protocol implementation
maturity, key transfer readiness, practical security, network and
encrypor readiness has not yet been fully satisfied even for short
distance communication and none of the above has been satisfied
for long distance transmission (>70Km).
3.5 Trojan Horse Attack Figure 2: A Schematic of the optimal cloning set-up
While considering the plug and play systems, Alice's device is
open to receive photons So Eve in the middle may send in a light The one-photon input state |ψin is split at a beam splitter of
pulse towards Alice‟s polarizer, this light gets reflected from the reflectivity R. The reflected part is split once more to allow the
polarizer and leaks vital information to Eve[8]. Other attacks such simultaneous uncertainty limited measurement of the four
as the time-shift attack, has been successfully used to crack quadrature components ẋ H, ẋ V, ẏ H and ẏ V by homodyne
commercially used quantum key distribution system. This is the detection. The measurement result is then transmitted to an optical
first successful demonstration of hacking in a quantum modulation setup that displaces the transmitted field amplitudes by
channel.[15]Presently hackers are not having much to gain by a feedback of fR times the measured amplitudes.Thus we can say
spending their resource in hacking the sparsely used a quantum that if advancements in quantum communication take place so is
channel. But as QC users increase one can expect more such the developments in countering basic properties of quantum like
unexpected innovative attacks which are unthought-of till date. No-Cloning of bits.
61
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 26
62
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 26
understanding it. (Some encryption algorithms, known SHA-512 256 Beyond 2030
as nonmalleable ones, prevent this, but others do not.) However, if SHA-224 112 Through 2030
a message is digitally signed, any change in the message after
signing will spoil or disintegrate the signature. Further, there is no
efficient way to modify a message and its signature to produce a We see that an algorithm using an n-bit key which is proving secure
new message without invalidating the signature. now may not be safe in a few years from now.
63
©2010 International Journal of Computer Applications (0975 - 8887)
Volume 1 – No. 26
64