Hide and seek with quantum resources: New and modified protocols for quantum steganography

10/12/2021
by   Rohan Joshi, et al.
0

Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that the eavesdropper is unaware of its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, it has been shown that such protocols are vulnerable to a certain steganalysis attack that can detect the presence of the hidden message and suppress the entire communication. In this work, we elaborate on the vulnerabilities of the original protocol which make it insecure against this detection attack. Further, we propose a novel steganography protocol using discrete modulation continuous variable QKD that eliminates the threat of this detection-based attack. Deriving from the properties of our protocol, we also propose modifications in the original protocol to dispose of its vulnerabilities and make it insusceptible to steganalysis.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/13/2021

Quantum and semi-quantum sealed-bid auction: Vulnerabilities and advantages

A family of existing protocols for quantum sealed-bid auction is critica...
research
07/05/2021

Berserker: ASN.1-based Fuzzing of Radio Resource Control Protocol for 4G and 5G

Telecom networks together with mobile phones must be rigorously tested f...
research
12/26/2022

New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate

Here we present two new schemes for quantum key distribution (QKD) which...
research
02/09/2020

Message Type Identification of Binary Network Protocols using Continuous Segment Similarity

Protocol reverse engineering based on traffic traces infers the behavior...
research
10/20/2020

On the lightweight authenticated semi-quantum key distribution protocol without Trojan horse attack

Recently, Tsai et al. (Laser Phys. Lett. 17, 075202, 2020) proposed a li...
research
07/20/2023

Formal-Guided Fuzz Testing: Targeting Security Assurance from Specification to Implementation for 5G and Beyond

Softwarization and virtualization in 5G and beyond necessitate thorough ...
research
11/10/2022

Probabilistic amplitude shaping for continuous-variable quantum key distribution with discrete modulation

To achieve the maximum information transfer and face a possible eavesdro...

Please sign up or login with your details

Forgot password? Click here to reset