论量子系统安全密钥的主要技术装置和要求

V. Averyanov, Igor Kartsan
{"title":"论量子系统安全密钥的主要技术装置和要求","authors":"V. Averyanov, Igor Kartsan","doi":"10.21681/2311-3456-2023-2-65-72","DOIUrl":null,"url":null,"abstract":"Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS\",\"authors\":\"V. Averyanov, Igor Kartsan\",\"doi\":\"10.21681/2311-3456-2023-2-65-72\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.\",\"PeriodicalId\":422818,\"journal\":{\"name\":\"Voprosy kiberbezopasnosti\",\"volume\":\"154 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Voprosy kiberbezopasnosti\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21681/2311-3456-2023-2-65-72\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2023-2-65-72","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文的目的:开发新的方法、算法和模型,以检测与以光粒子的单光子纯态形式表示的广播数据有关的入侵者的未经授权的行为,这将允许:加强基本安全密钥的保密性,改进电信系统合法用户的数据交换和处理程序,扩展现有技术解决方案在其经典表示中的功能。研究方法:系统分析法、信息安全评估法。结果:给出了基本状态测量结果匹配过程的关键系统错误风险,以及攻击者通过具有明确关键结果的攻击活动阶段实现漏洞的假定潜在可能性。本文确定了混合单光子态的转换和对接收硬件的施加是不受控制的、不可解释的,并且不包含在任何量子协议算法中,这是基于量子力学的现代密码系统最关键的漏洞。提出了一种解决“静默”扫描问题的方法,并抵消了对量子信道和粒子态的隐藏主动攻击。该解决方案的本质在于随机基向量状态的非正交性和包含脉冲信号广播信息路径的主通信信道的复制,其中备份线路中已知数量的同步语句允许跟踪攻击者。基础知识是对主安全密钥形成的每个阶段发生的主要自然错误的了解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS
Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model for Building Competencies of a Computer Crime Investigator ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY Cellular Automata and Their Generalizations in Cryptography. Part 1 A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1