pith. sign in

arxiv: quant-ph/0407131 · v1 · submitted 2004-07-16 · 🪐 quant-ph

A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

classification 🪐 quant-ph
keywords algorithmattacksauthenticationcryptographyman-in-the-middlequantumrespectapplied
0
0 comments X
read the original abstract

In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.