Paper
21 May 2015 Implementing Diffie-Hellman key exchange using quantum EPR pairs
Sayonnha Mandal, Abhishek Parakh
Author Affiliations +
Abstract
This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sayonnha Mandal and Abhishek Parakh "Implementing Diffie-Hellman key exchange using quantum EPR pairs", Proc. SPIE 9500, Quantum Information and Computation XIII, 950006 (21 May 2015); https://doi.org/10.1117/12.2176775
Lens.org Logo
CITATIONS
Cited by 4 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum communications

Quantum cryptography

Cryptography

Particles

Photons

Polarization

Quantum information

RELATED CONTENT

Quantum technology’s role in cybersecurity
Proceedings of SPIE (March 02 2023)
About the new architecture of quantum communication
Proceedings of SPIE (January 06 2009)
Remote state preparation and operation for photons
Proceedings of SPIE (January 11 2005)
Quantum three-pass cryptography protocol
Proceedings of SPIE (September 13 2002)

Back to Top