On the post-quantum security of encrypted key exchange protocols

We investigate the post-quantum security of the encrypted key exchange(EKE) protocols based on some basic physical parameters of ion-trap quantum computer, and show that the EKE protocol with a 40-bit password will be secure against a quantum adversary with several ion-trap quantum computers. We present a password encrypted no-key protocol to resist middle-man attack, and prove that it is also with the post-quantum security. The analysis presented here is probably of general meaning for the security evaluation of various hybrid cryptosystems.

[1]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[3]  Biyao Yang,et al.  Full Quantum Treatment of Rabi Oscillation Driven by a Pulse Train and Its Application in Ion-Trap Quantum Computation , 2010, IEEE Journal of Quantum Electronics.

[4]  J. Cirac,et al.  Quantum Computations with Cold Trapped Ions. , 1995, Physical review letters.

[5]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[6]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[7]  Richard Cleve,et al.  Fast parallel circuits for the quantum Fourier transform , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[8]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[9]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[10]  Li Yang,et al.  Qubit-string-based bit commitment protocols with physical security , 2010, 1011.5099.

[11]  Peter W. Shor,et al.  Fault-tolerant quantum computation , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[12]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[13]  David P. Jablon Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[14]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[15]  Peter W. Shor Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .

[16]  Gene Tsudik,et al.  Refinement and extension of encrypted key exchange , 1995, OPSR.

[17]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .