Hacking single-photon avalanche detector in quantum key distribution via
pulse illumination
- URL: http://arxiv.org/abs/2002.09146v2
- Date: Mon, 3 Aug 2020 13:48:19 GMT
- Title: Hacking single-photon avalanche detector in quantum key distribution via
pulse illumination
- Authors: Zhihao Wu, Anqi Huang, Huan Chen, Shi-Hai Sun, Jiangfang Ding,
Xiaogang Qiang, Xiang Fu, Ping Xu, Junjie Wu
- Abstract summary: We show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch.
We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key.
- Score: 6.285329211368446
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) has been proved to be
information-theoretically secure in theory. Unfortunately, the imperfect
devices in practice compromise its security. Thus, to improve the security
property of practical QKD systems, a commonly used method is to patch the
loopholes in the existing QKD systems. However, in this work, we show an
adversary's capability of exploiting the imperfection of the patch itself to
bypass the patch. Specifically, we experimentally demonstrate that, in the
detector under test, the patch of photocurrent monitor against the detector
blinding attack can be defeated by the pulse illumination attack proposed in
this paper. We also analyze the secret key rate under the pulse illumination
attack, which theoretically confirmed that Eve can conduct the attack to learn
the secret key. This work indicates the importance of inspecting the security
loopholes in a detection unit to further understand their impacts on a QKD
system. The method of pulse illumination attack can be a general testing item
in the security evaluation standard of QKD.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Hacking coherent-one-way quantum key distribution with present-day technology [0.0]
Recent results have shown that the secret-key rate of coherent-one-way (COW) quantum key distribution (QKD) scales quadratically with the system's transmittance.
This was proven by using a so-called zero-error attack, which relies on an unambiguous state discrimination (USD) measurement.
Here, we investigate the feasibility and effectiveness of zero-error attacks against COW QKD with present-day technology.
arXiv Detail & Related papers (2024-06-19T18:16:29Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Automated verification of countermeasure against detector-control attack
in quantum key distribution [0.0]
Attacks that control single-photon detectors in quantum key distribution are capable of eavesdropping the secret key.
We report an automated testbench that checks the detector's vulnerabilities against these attacks.
arXiv Detail & Related papers (2023-05-29T21:08:08Z) - State-Blocking Side-Channel Attacks and Autonomous Fault Detection in Quantum Key Distribution [0.0]
Side-channel attacks allow an Eavesdropper to use insecurities in the practical implementation of QKD systems.
We discuss a scheme to autonomously detect such an attack during an ongoing QKD session.
We present how Alice and Bob can put in place a countermeasure to continue use of the QKD system, once a detection is made.
arXiv Detail & Related papers (2023-05-29T10:43:57Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - Strong pulse illumination hacks self-differencing avalanche photodiode
detectors in a high-speed quantum key distribution system [3.5097098058555787]
We investigate the loopholes of self-differencing(SD) avalanche photodiode(APD) detector.
We demonstrate experimental testing of SD APD detector under strong pulse illumination attack.
This attack presents blinding stability and helps an eavesdropper to learn the secret key without introducing extra QBER.
arXiv Detail & Related papers (2022-05-09T10:40:46Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Countermeasure against quantum hacking using detection statistics [0.0]
We present a new countermeasure against these kind of attacks based on the use of multi-pixel detectors.
We show that with this method, we are able to estimate an upper bound on the information an eavesdropper could have on the key exchanged.
arXiv Detail & Related papers (2020-10-16T16:19:50Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.