Analysis of the Security of BB84 by Model Checking

Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was noted that quantum computers could break public key cryptosystems based on number theory extensive studies have been undertaken on QKD. Based on quantum mechanics, QKD offers unconditionally secure communication. Now, the progress of research in this field allows the anticipation of QKD to be available outside of laboratories within the next few years. Efforts are made to improve the performance and reliability of the implemented technologies. But several challenges remain despite this big progress. The task of how to test the apparatuses of QKD For example did not yet receive enough attention. These devises become complex and demand a big verification effort. In this paper we are interested in an approach based on the technique of probabilistic model checking for studying quantum information. Precisely, we use the PRISM tool to analyze the security of BB84 protocol and we are focused on the specific security property of eavesdropping detection. We show that this property is affected by the parameters of quantum channel and the power of eavesdropper.

[1]  Mostafa Azizi,et al.  Security Oriented Analysis of B92 by Model Checking , 2008, 2008 New Technologies, Mobility and Security.

[2]  Nikolaos Papanikolaou,et al.  Model – Checking Quantum Protocols , 2006 .

[3]  Mostafa Azizi,et al.  Analysis of Quantum Cryptography Protocols by Model Checking , 2010 .

[4]  Nick Papanikolaou,et al.  Reasoning formally about quantum systems : an overview , 2005 .

[5]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[6]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[7]  Rajagopal Nagarajan,et al.  QMC: A Model Checker for Quantum Systems , 2007, CAV.

[8]  Hoi-Kwong Lo,et al.  From Quantum Cheating to Quantum Security , 2000, quant-ph/0111100.

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Liu Song-hao,et al.  Plug and Play Systems for Quantum Cryptography , 2004 .

[11]  Rajagopal Nagarajan,et al.  An Automated Analysis of the Security of Quantum Key Distribution , 2005, ArXiv.

[12]  Rajagopal Nagarajan,et al.  Probabilistic Model-Checking of Quantum Protocols , 2005, ArXiv.

[13]  Nikolaos Papanikolaou,et al.  Techniques for design and validation of quantum protocols , 2004 .

[14]  Mostafa Azizi,et al.  Implementation of secure key distribution based on quantum cryptography , 2009, 2009 International Conference on Multimedia Computing and Systems.

[15]  Rajagopal Nagarajan,et al.  Formal Verification of Quantum Protocols , 2002 .

[16]  Rajagopal Nagarajan,et al.  Specification and Verification of Quantum Protocols , 2010 .