Risk Assessment Approach to Estimate Security of Cryptographic Keys in Quantum Cryptography
Increased interest in quantum cryptography is observed in recent years. Although this technique is characterized by a very high level of security, there are still challenges of quantum key distribution that should be solved. One of the most important problem remains security mechanisms for the key distillation process which can be effectively controlled by end users. This article presents a new idea for security assessment of cryptographic key based on the risk management in quantum cryptography. This proposal assumes the estimation of risk level using two components: likelihood and impact. The likelihood can be defined by the probability of eavesdropping during the quantum bit estimation. The impact is associated with the effect of key reduction in the all steps of key distillation process. Using this novel approach end users of quantum cryptography will be able to control both efficiency and security level of cryptographic keys.
KeywordsSecurity Quantum key distribution Risk assessment Symmetric cryptography
This work was supported by the ESF in “Science without borders” project, reg. nr. CZ.02.2.69/0.0/0.0/16_027/0008463 within the Operational Programme Research, Development and Education.
- 3.Jekot, M., Niemiec, M.: IT risk assessment and penetration test: comparative analysis of IT controls verification techniques. In: 2016 International Conference on Information and Digital Technologies (IDT), pp. 118–126 (2016)Google Scholar
- 4.Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. NIST Special Publication 800–30 (2002)Google Scholar
- 5.Machnik, P.: Comparison of transmission parameters of different IPsec virtual private networks. In: International Conference on Telecommunications and Signal Processing (TSP 2009), Budapest, pp. 132–134 (2009)Google Scholar
- 7.Benslama, M., Benslama, A., Aris, S.: Quantum Cryptography. Quantum Communications in New Telecommunications Systems. Wiley (2017)Google Scholar
- 10.Dusek, M., Lutkenhaus, N., Hendrych, M.: Quantum Cryptography. Progress in Optics, vol. 46. Elsevier (2006)Google Scholar
- 11.Bennett, C.H., Brassard, G.: Public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179 (1984)Google Scholar
- 13.Brassard, G., Salvail, L.: Secret-Key Reconciliation by Public Discussion, pp. 410–423. Springer (1994)Google Scholar