Can Quantum Key Distribution Be Secure
Can Quantum Key Distribution Be Secure
Can Quantum Key Distribution Be Secure
Horace P. Yuen
Department of Electrical Engineering and Computer Science
Department of Physics and Astronomy
Northwestern University, Evanston Il. 60208
email: yuen@eecs.northwestern.edu
May 5, 2014
The importance of quantum key distribution as a cryptographic method depends upon its
purported strong security guarantee. The following gives reasons on why such strong security
guarantee has not been validly established and why good QKD security is dicult to obtain.
I. QKD KEY IS QUITE IMPERFECT
Three major problems in cryptography involve the establishment of a shared secret key be-
tween two users Adam and Babe and the use of this key to encrypt messages for privacy
and integrity, against possible attack from Eve who may want to eavesdrop or to alter the
messages. Quantum key distribution (QKD) protocols, specically of the BB84 variety [1],
This paper is the preliminary version of one to appear in Proc. IEEE.
1
a
r
X
i
v
:
1
4
0
5
.
0
4
5
7
v
1
[
q
u
a
n
t
-
p
h
]
2
M
a
y
2
0
1
4
purport to provide perfect security for the rst problem when Eve obtains information on
the generated key by interception, through the detection of quantum disturbance to ensure
such information is vanishingly small. The generated key could then be used for encryp-
tion with the perfectly secure one-time pad, or for message authentication. QKD is usually
compared with the public-key method currently widely employed for key distribution, the se-
curity of which depends on complexity consideration with unproved complexity assumption.
In contrast, QKD key has information theoretic security (ITS) that retains intrinsic uncer-
tainty to Eve, and so cannot be broken by increasing computational power as public-key
cryptosystems can be so broken.
The QKD generated key is widely claimed and perceived, in both the technical and popular
literature, to have perfect security, or is so except for a very small probability [1], or have
absolute security or unconditional security. In actuality, the QKD key is imperfect for
sure and its deviation from a perfect key is huge. Consider the prevalent claim that the
QKD generated key K is perfect except for a small probability upper bounded by a small
parameter , a conclusion drawn in the literature from bounding a trace distance security
criterion d, d . Being perfect here implies that the bit sequence K is the uniform
random variable U to Eve. Such conclusion was drawn and maintained to date from an
obvious error of reasoning, which was repeatedly pointed out [2-4] but never acknowledged.
Indeed, with d > 0 the key K is not perfect with probability 1, not with probability at most
, as will be discussed later on.
Equally signicantly, the security of a QKD protocol cannot be made arbitrarily close to
perfect at any xed key generation rate through a security parameter s in accordance with
2
the original denition of unconditional security. Such claim is based on purported proofs
that Eves maximum mutual information (called accessible information in the quantum
case) on K from any attack, I
E
(K), goes to zero as |K| = n gets large,
I
E
0 as n (1)
Thus, n is taken to be the security parameter s. Even if the proofs are valid, and they are
not, the claim (1) does not imply K is perfect asymptotically. Innity is not a number, and
it is the convergence rate of I
E
(K) that determines the asymptotic key rate and security
level. This can be seen as follows [2].
Information theoretic quantities like mutual information are theoretical constructs whose
operational meaning need to be spelled out. In the context of ordinary communications,
they are given through the Shannon coding theorems in terms of the empirical data rate
and error rate. In the context of cryptography, they have not been previously provided
except in the perfect case. Generally, it is Eves various success probabilities in getting
at K that are the relevant operational security criteria. From her attack Eve derives a
whole conditional distribution p(K|Y
E
) on the N = 2
n
possible values of the bit sequence
K given her measurement result Y
E
and knowledge from the users open exchange. This
a posteriori p(K|Y
E
) is derived from the cryptosystem transition probability p(Y
E
|K) and
Eves a priori distribution of K, through Bayes Rule. Any single number criterion such as
I
E
merely expresses a constraint on p(K|Y
E
). In particular, perfect security is expressed by
p(K|Y
E
) = U, the uniform random variable (with the same number of bits as K).
Let us drop the conditioning dependence and order the N dierent values of p(K|Y
E
) as
3
p
1
...... p
N
. Eves maximum probability p
1
of getting the whole K is clearly crucially
signicant, as it has to be suciently small for security. From Lemma 2 in [2], for l < n it
is possible that
I
E
n
2
l
, p
1
2
l
(2)
Since l is typically, in experiment and in theory, very much smaller than n with or without
privacy amplication (compressing the key to enhance security), the corresponding p
1
is very
much larger than that of a uniform K = U. Indeed, a very insecure K can satisfy (1), even
exponentially as in
I
E
= 2
(nlog n)
(3)
for a constant , in which it is possible p
1
2
n
for 1 as compared to 2
n
for a uniform
key. There is no unconditional security in QKD.
II. GUARANTEEDSECURITYLEVEL IS VERYLOW
AND NOT PROVED
The above p(K|Y
E
) describes only the security of K during the generation process. When
K is used, say in one-time pad encryption (OTP, K xored bit by bit into the data and
used only once) as is commonly suggested, parts of K may become known to Eve and the
correlation among dierent bits in K for an imperfect key may seriously compromise the rest
of K. In particular, in a known-plaintext attack (KPA) a segment of the encrypted data X,
Y = X K, may be known to Eve, a common situation in commercial applications though
4
perhaps not in many military ones. The ciphertext Y is always assumed openly known.
Thus, the portion of K corresponding to the known portion of X is known to Eve, which
she could use to get at the other portion of K through correlation among the bits of K,
and together with the corresponding portion of Y she may learn a lot about the unknown
portion of X. Eve can also use statistical information for such attacks, but we restrict to
exactly known data for clarity and simplicity. In conventional symmetric key cryptography,
it is always KPA that is the real concern. In fact, in an additive stream cipher Y = X K,
a uniform X to Eve would completely cover up K from Y and Eve could get at K only from
how it is generated.
It was only about ten years ago, long after many QKD security proofs were oered, that it
was found that the quantum accessible information criterion is not secure against KPA; in
fact its quantitative guarantee turns out so poor that it is not ruled out that Eve may break
the whole n-bit K with just log n bits of known data bits. This is a quantum cryptosystem
problem not present in conventional ITS cryptosystems. As a consequence, a quantum trace
distance criterion d is now widely (though not yet universally) employed as the security
criterion in lieu of accessible information [1]. The claim is that under the security condition
d , called -secure, K is secure with K being uniform to Eve with probability at least
1 , and K is furthermore decoupled totally from Eves probe set during her attack so
that K is universally composable. This interpretation of d is wrong and was pointed
out repeatedly, but the impression is maintained that such interpretation is correct, and
furthermore that the obtainable level of the theoretical and experimental QKD protocols
with d guarantee is adequate.
5
To understand the signicance of such QKD security guarantee and its correct operational
meaning, we briey review schematically the usual security analysis of QKD protocols as
depicted in Fig. 1.
Fig. 1: Schematic representation of a QKD system incorporating error correction and
privacy amplication with generated key K.
We omit the part before a so-called sifted key, K, is generated between Adam and Babe
upon which Eve has set her quantum probe
E
k
. The protocol goes forward with the checked
quantum bit error rate (QBER) below a set threshold so that the H
min
( log p
1
for
an average p
1
), the minimum entropy of Eve on K for any attack, can be bounded
from below. An error correcting code (ECC) is used to correct all the errors in K with
output key K
into a much
shorter K for increased security level. The overall security of K is measured by a quantum
trace distance d involving
E
k
, which lower bounds any statistical distances between Eves
possible distribution {p
i
} on the N possible vales of K and the uniform U,
(P, U) =
1
2
i
|p
i
U
i
| (4)
The d performance of K obtained is an average over an openly known family of PAC. The
6
ECC information leak to Eve is given by the following formula, with h() the binary entropy
function,
leak
EC
= f n h(QBER) (5)
where f 2 is ad hoc correction factor for a nite n protocol with f = 1 taken to be the
asymptotic value. The net key length generated is taken to be
|K
g
| = n leak
EC
(6)
As in product manufacturing, quantitative cryptographic guarantee needs to be expressed
in terms of probability, not average. This is already done for information theoretic security
in practical conventional cryptography, such as OTP or message authentication, and the
statistical distance is not used whose correct probability signicance will be given in the
bound (7) below. Under the wrong probability interpretation of d or , the d guarantee
is still an average over PAC and needs to be converted to probabilistic individual PAC
guarantee through Markov inequality. For minimizing the failure probability of not getting
a guarantee, this yields an individual PAC guarantee at the level d
1
2
instead of d [4]. Note that
the specic PAC employed, which has to be openly announced due to its size, may introduce
serious security leak just by itself. The PAC is typically a binary matrix or Toeplitz matrix
that gives an n-bit output K from an m-bit input K
min
does not improve H
min
eectively) of K