Digest of Quantum Stream Cipher based on Holevo-Yuen Theory
- URL: http://arxiv.org/abs/2206.01937v1
- Date: Sat, 4 Jun 2022 08:17:34 GMT
- Title: Digest of Quantum Stream Cipher based on Holevo-Yuen Theory
- Authors: Masaki Sohma and Osamu Hirota
- Abstract summary: This paper introduces an overview and a back ground of our paper that is entitled Quantum stream cipher based on Holevo-Yuen theory.
Around 2000, a new quantum stream cipher was proposed as a technique to challenge the possibility of overcoming drawbacks of OTP in practical use.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: So far, quantum key distribution (QKD) has been the main subject in the field
of quantum cryptography, but that is not quantum cryptographic communication,
it is only the ability to send keys for cryptographic purposes. To complete
cryptographic communication, a technique for encrypting data is necessary, and
the conventional cryptographic technique of mathematical symmetric key cipher
or One Time Pad (OTP) is adopted in the discussion so far. However, OTP is not
the ultimate cipher for data encryption, because it does not satisfy security
conditions in the modern cryptology. Around 2000, a new quantum stream cipher
was proposed as a technique to challenge the possibility of overcoming
drawbacks of OTP in practical use. Recently, we have published some review
papers on it in Entropy (Open access journal), and others. This paper
introduces an overview and a back ground of our paper that is entitled Quantum
stream cipher based on Holevo-Yuen theory.
Related papers
- Quantum stream cipher and Quantum block cipher -The Era of 100 Gbit/sec real-time encryption- [0.0]
In the theory of cryptology, the Shannon impossibility theorem states that the upper bound of the security of a plaintext against a ciphertext-only attack is the entropy of the secret key.
Such challenges have been attempted with quantum stream cipher and quantum data locking as block cipher.
Both ciphers are designed by means of differentiating the receiving performance of Bob with key and Eve without key according to the principle of quantum communication theory.
arXiv Detail & Related papers (2025-04-24T04:28:17Z) - Design of Quantum Stream Cipher: Part-I -Lifting the Shannon Impossibility Theorem- [0.0]
This paper is dedicated to the late Professor H.P. Yuen in commemoration to our 50-year friendship.
He invented the concept of quantum stream cipher. It is designed based on a completely different concept from conventional ciphers.
It is based on hiding the ciphertext of mathematical cipher with quantum noise, achieving unprecedented information-theoretic security in any cipher.
arXiv Detail & Related papers (2025-03-19T04:02:08Z) - The Evolution of Cryptography through Number Theory [55.2480439325792]
cryptography began around 100 years ago, its roots trace back to ancient civilizations like Mesopotamia and Egypt.
This paper explores the link between early information hiding techniques and modern cryptographic algorithms like RSA.
arXiv Detail & Related papers (2024-11-11T16:27:57Z) - On the practicality of quantum sieving algorithms for the shortest vector problem [42.70026220176376]
lattice-based cryptography is one of the main candidates of post-quantum cryptography.
cryptographic security against quantum attackers is based on lattice problems like the shortest vector problem (SVP)
Asymptotic quantum speedups for solving SVP are known and rely on Grover's search.
arXiv Detail & Related papers (2024-10-17T16:54:41Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Post Quantum Cryptography & its Comparison with Classical Cryptography [0.0]
Quantum cryptography operates on the principles of quantum mechanics, offering a new frontier in secure communication.
By contrasting quantum cryptography with its classical counterpart, it becomes evident how quantum mechanics revolutionizes the landscape of secure communication.
arXiv Detail & Related papers (2024-03-28T10:38:13Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Exact Homomorphic Encryption [0.0]
This article proposes a framework dubbed Exact Homomorphic Encryption, EHE, enabling exact computations on encrypted data without the need for pre-decryption.
Two fundamental traits of quantum gates, invertibility and the noncommutativity, establish the success of EHE.
arXiv Detail & Related papers (2024-01-17T07:48:52Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Cryptography: Quantum Key Distribution, a Non-technical Approach [0.0]
Quantum mechanics provides means to create an inherently secure communication channel that is protected by the laws of physics.
This paper is a non-technical overview of quantum key distribution, a type of cryptography poised to exploit the laws of quantum mechanics directly.
arXiv Detail & Related papers (2022-11-09T15:30:23Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Security in Quantum Cryptography [5.914028209673859]
Quantum cryptography exploits principles of quantum physics for the secure processing of information.
We review this physical notion of security, focusing on quantum key distribution and secure communication.
arXiv Detail & Related papers (2021-01-29T19:00:54Z) - A quantum encryption design featuring confusion, diffusion, and mode of
operation [0.0]
We propose a non-OTP quantum encryption scheme utilizing a quantum state creation process to encrypt messages.
As essentially a non-OTP quantum block cipher the method stands out against existing methods with the following features.
arXiv Detail & Related papers (2020-10-06T22:23:30Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.