期刊文献+

针对非可信源的特洛伊木马攻击技术研究 预览

Analysis of Trojan-Horse Attack against Untrusted Source
在线阅读 下载PDF
分享 导出
摘要 飞速发展的信息时代对信息安全保护提出了更高的要求,近年来基于量子物理属性的量子密码因其安全高效的优点而受到广泛关注。然而实际量子密钥分发系统往往达不到理想状态,这给实际通信系统带来很多安全性问题。本文首先介绍了基于量子纠缠的Ekert91量子密钥分发协议的原理和基本流程,在此基础上,借鉴基于极化单光子量子密钥分发协议中的特洛伊木马攻击思想,设计了针对纠缠协议的量子黑客攻击方案,同时对攻击思想、攻击原理、攻击步骤以及攻击效果进行了详细的分析。通过验证分析,所提攻击方案针对构成安全密钥的EPR光子对总量的30%进行测量,窃听者可以获得29.25%的安全密钥且只引入0.75%的误码率,具有重要的理论意义和现实可行性。 The rapid development of information age puts forward higher requirements on information se-curity protection. In recent years, quantum cryptography based on the theory of quantum physics gets more and more attention because of its reliability and high efficiency. However, the practical quantum key distribution system often cannot achieve the ideal state, which causes many security problems to the practical communication system. Firstly, this paper introduces the Ekert91 quantum key distribution (QKD) protocol based on quantum entanglement. Then, we propose a partial Trojan-horse attack scheme against this protocol and analyze the theory, process and the effect of the attack. The scheme measures thirty percent of EPR photon pairs used in the formation of security keys, the eavesdropper can obtain twenty-nine point two-five percent of security keys and only causes zero point seven-five percent error rate. The scheme possesses important theoretical significance and realistic feasibility.
出处 《计算机科学与应用》 2018年第1期59-66,共8页 Computer Science and Application
  • 相关文献

参考文献2

二级参考文献15

  • 1李超,聂敏.基于特洛伊木马攻击的多用户树型量子信令损伤模型及修复策略[J].光子学报,2012(10):1256-1260. 被引量:1
  • 2曾贵华.特洛依木马攻击下的量子密码安全性[J].软件学报,2004,15(8):1259-1264. 被引量:2
  • 3ZHOU N R,CHENG H L,et al.Three-party quantum network com-munication protocols based on quantum teleportation[J].International Journal of Theoretical Physics,2014,53(4):1387-1403. 被引量:1
  • 4GONG L H,LILT Y,ZHOU N R.Novel quantum virtual private net-work scheme for PON via quantum secure direct communication[J].International Journal of Theoretical Physics,2013,52(9):3260-3268. 被引量:1
  • 5MA H Y,CHEN B Q,et al.Development of quantum network based on multiparty quantum secret sharing[J].Canadian Journal of Physics,2008,86(9):1097-1101. 被引量:1
  • 6CHEN Y S,L1N Y W.Mobicast routing protocol for underwater sen-sor networks[J].IEEE Sensors Journal,2013,13(2):737-1403. 被引量:1
  • 7JONATHAN D,PLENIO M B,VEDRAL V,et al.Quantum hacking on quantum key distribution using homodyne detection[J].Physical Review A,2014,89(3):032304. 被引量:1
  • 8GHIU I.Asymmetric quantum telecloning of d-level systems and broadcasting of entanglement to different locations using the "many-to-many" communication protocol[J].Physical Review A,2003,67(1):012323. 被引量:1
  • 9YUAN Z S,BAO X H,LUA C Y,et al.Entangled photons and quan-tum communication[J].Physics Reports,2010,497(1):1-40. 被引量:1
  • 10EKERT A K.Quantum cryptography based on Bell's theorem[J].Physical Review Letters,1991,67(6):661-663. 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈