{"title":"论量子系统安全密钥的主要技术装置和要求","authors":"V. Averyanov, Igor Kartsan","doi":"10.21681/2311-3456-2023-2-65-72","DOIUrl":null,"url":null,"abstract":"Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS\",\"authors\":\"V. Averyanov, Igor Kartsan\",\"doi\":\"10.21681/2311-3456-2023-2-65-72\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.\",\"PeriodicalId\":422818,\"journal\":{\"name\":\"Voprosy kiberbezopasnosti\",\"volume\":\"154 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Voprosy kiberbezopasnosti\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21681/2311-3456-2023-2-65-72\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2023-2-65-72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS
Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.