Skip to main content
Log in

Immunity against Correlation Attack on Quantum Stream Cipher by Yuen 2000 Protocol

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

This paper presents the security analysis on the quantum stream cipher so called Yuen-2000 protocol (or αη scheme) against the fast correlation attack, the typical attack on stream ciphers. Although the security of a very simple experimental model of the quantum stream cipher without a randomization may be reduced to a complexity based security against the correlation attacks under a large number of known plaintexts, it is not a basic feature of Yuen 2000 protocol. In fact, we clarify that there exists a randomization scheme which attains the perfect correlation immunity against such attacks under an approximation. And in this scheme, the running key correlation from the second randomization that determines the mapping patterns is broken off also by quantum noise. In such a case, any fast correlation attack does not work on the quantum stream cipher.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. H. P. Yuen, arXiv e-print quant-ph/0311061V6, LANL, 2003.

  2. G. A. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen, Phys. Rev. Lett. 90, 227901–227904, (2003).

    Google Scholar 

  3. E. Corndorf, C. Liang, G. S. Kanter, P. Kumar, and H. P. Yuen, Phys Rev A, 71, 062326 (2005).

    Google Scholar 

  4. O. Hirota, M. Sohma, M. Fuse, and K. Kato, Phy. Rev. A, 72, 022335 (2005).

  5. Schneier B. (2003). Applied Cryptography. Wiley, New York

    Google Scholar 

  6. Maurer U.M. (1991). Advances in Cryptography-EUROCRYPT’90. Springer-Verlag, Berlin, p. 361

    Google Scholar 

  7. Helstrom C.W. (1976). Quantum Detection and Estimation Theory. Academic Press, New York

    Google Scholar 

  8. Wootters W.K., Zurec W.H. (1982). Nature 299:802

    Article  ADS  Google Scholar 

  9. Buzek V., Hillery M. (2001). Phys World 14(11):25–29

    Google Scholar 

  10. Meier W., Straffelbach O. (1989). J Cryptogr 1:159–176

    Article  MATH  Google Scholar 

  11. Chepyzhov V., Smeets B. (1991). Advances in Cryptography-EUROCRYPT’91. Springer- Verlag, Berlin, pp. 179–186

    Google Scholar 

  12. Johansson T., Jonsson F. (1999). Advances in Cryptography-CRYPT’99. Springer- Verlag, Berlin, pp. 179–186

    Google Scholar 

  13. V. Chepyzhov, T. Johansson, and B. Smeets, Fast Software Encryption, FSE 2000 in Lecture Notes in Computer Science (Springer-Verlag, Berlin, 2000).

  14. O. Hirota, T. Usuda, and M. Fuse, in Conference on Quantum Commun. and Quantum Imaging III, Proceedings of SPIE, Moscow, vol. 5893, 2005.

  15. Y. Mizukami, K.Watanabe, and O.Hirota, in National Convention Record of IEICE of Japan, Proceedings of 2006 IEICE General Conference, Tokyo, B-10-39, 2006.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osamu Hirota.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hirota, O., Kurosawa, K. Immunity against Correlation Attack on Quantum Stream Cipher by Yuen 2000 Protocol. Quantum Inf Process 6, 81–91 (2007). https://doi.org/10.1007/s11128-006-0039-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-006-0039-9

Keywords

PACS