VERIFICATION OF QUANTUM CRYPTOGRAPHY
PROTOCOLS BY MODEL CHECKING
Mohamed Elboukhari1 , Mostafa Azizi2 and Abdelmalek Azizi1,3
1 dept. Mathematics & Computer Science, FSO, University Mohamed Ist, Morocco
2 dept. Applied Engineering, ESTO, University Mohamed Ist, Oujda, Morocco
3Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
KEYWORDS
Quantum Cryptography, Model Checking, BB84 Protocol, Verification
Original Source URL: http://airccse.org/journal/nsa/1010ijnsa04.pdf
http://airccse.org/journal/jnsa10_current.html
Mohamed Elboukhari1 , Mostafa Azizi2 and Abdelmalek Azizi1,3
1 dept. Mathematics & Computer Science, FSO, University Mohamed Ist, Morocco
2 dept. Applied Engineering, ESTO, University Mohamed Ist, Oujda, Morocco
3Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years and efforts are made to improve the performance and reliability of the implemented technologies. But despite this big progress, several challenges remain. For example the task of how to test the devices of QKD did not yet receive enough attention. These apparatuses become heterogeneous, complex and so demand a big verification effort. In this paper we propose to study quantum cryptography protocols by applying the technique of probabilistic model checking. Using PRISM tool, we analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropper's information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the eavesdropper’s power and the quantum channel.
KEYWORDS
Quantum Cryptography, Model Checking, BB84 Protocol, Verification
Original Source URL: http://airccse.org/journal/nsa/1010ijnsa04.pdf
http://airccse.org/journal/jnsa10_current.html
No comments:
Post a Comment