Journal of Computer Science

Quantum Cryptography with Several Cloning Attacks

Mustapha Dehmani, Hamid Ez-Zahraouy and Abdelilah Benyoussef

DOI : 10.3844/jcssp.2010.684.688

Journal of Computer Science

Volume 6, Issue 7

Pages 684-688

Abstract

Problem statement: In a previous research, we investigated the quantum key distribution of the well known BB84 protocol with several intercept and resend attacks. In the present research, we studied the effect of many eavesdroppers cloning attacks of the Bennett-Brassard cryptographic protocol on the quantum error and mutual information between honest parties and information with sender for each eavesdropper. Approach: The quantum error and the mutual information were calculated analytically and computed for arbitrary number of cloning attacks. Our objective in this study was to know if the number of the eavesdroppers and their angle of cloning act on the safety of information. Results: It was found that the quantum error and the secured/no secured transition depend strongly on the number of eavesdropper and their angle of attacks. The particular cases where all eavesdroppers collaborate were also investigated. Conclusion: Furthermore, the cloning attack’s quantum error is lower than the intercept and resends attacks one, which means that the cloning attacks is the optimal one for arbitrary number of eavesdropper.

Copyright

© 2010 Mustapha Dehmani, Hamid Ez-Zahraouy and Abdelilah Benyoussef. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.