AK-15 quantum key distribution protocol

Greetings to everyone who was brought here by the desire to learn about one of the protocols of quantum cryptography, since the possible appearance of a quantum computer in the near future will jeopardize many existing methods of cryptography.

At the moment, protocols have been proposed, a detailed analysis of which you can find on Habré, but I can recommend you an article with a pretty good overview: click here .

It is worth noting the distinctive feature of the AK-15 is the presence of authentication between legitimate users.

Introduction

The protocol in question, proposed by Khaled Elleyty and Abdulbast Abushgra in 2015, defines the interaction of our longtime friends Alice and Bob. Their communication will consist of several interconnected stages, and at some point, readers will be asked to parallelize due to the use of several different communication channels.

A small educational program:

EPR channel of entangled states

It is based on the Einstein-Podolsky-Rosen paradox. Here are some useful links:

First stage

To begin with, Alice has a plaintext that needs to be passed to Bob. It must first convert it to bit representation, and then to quantum bits ( qubits ):

→ → A, A -

A = \ begin {cases} | f> = (\ alpha | 0> + \ beta | 1>), & 0 \\ | f> = (\ alpha | 0> - \ beta | 1>), & 1 \ end {cases}

, (DM)( ), , . ( ). , , . -PNS

DM, ( - , - ))

, . ( ),  Ikubit,    , (|×> |+>) . 

- , .

-

4- -

|  \ Phi _ +> = \ frac {1} {\ sqrt2} (| 00> _ {AB} + | 11> _ {AB})| \ Phi _-> = \ frac {1} {\ sqrt2} (| 00> _ {AB} - | 11> _ {AB})|  \ psi _ +> = \ frac {1} {\ sqrt2} (| 01> _ {AB} + | 10> _ {AB})|  \ psi _-> = \ frac {1} {\ sqrt2} (| 01> _ {AB} - | 10> _ {AB})

Iepr :

string Iepr
Iepr

(t1,t2)- , ,  Iepr. N - ( ). DM, . p, , .S - , , . R - , .

:

-

, , - Iepr

  • ,

  • .

| \ Phi_ {ab}> \ otimes |  \ varphi_c> = \ frac {1} {\ sqrt2} (| 0> _A | 0> _B + | 1> _A | 1> _B) \ otimes (\ alpha | 0> _C + \ beta | 1> _C) = \ frac {1} {\ sqrt2} (\ alpha | 000> + \ beta | 010> + \ alpha | 101> + \ beta | 111>) _ {ACB}
  • , :

| \ Phi _ {ABC}>: | \ Phi _ {AC}>, | \ phi _ {B}>
  • AC- , B- .

|  \ psi_ {AC}> \ otimes (\ alpha | 0> + \ beta | 1>) _ B

,

  • , , (00,01,10 11) ( ),

( Iepr),   , . n- (SSK) n- ,  XOR. .

Iepr( ), Ikubit (|×> |+>) 4- ( ). ( ) . , Ikubit . QBERT( ), Iepr.

: Man-In-Middle(MIMA)  The Intercept-Resend Attacks. .

:

about

Alice and Bob first initiate EPR communication with entanglement exchange. If it succeeds, then both sides begin to exchange qubits to create a secret key. Having received the row I kubit  , Bob builds the matrix, and using the row with R indices, he restores the correct DM. And it does the first investigation by inserting a parity string into a matrix, then counts each row to see if it's even parity. If there is an odd line, it must be checked for errors. If everything is successful, the n-qubit secret key (SSK) is generated.

Author's article




All Articles