Physical Security of Chip-Based Quantum Key Distribution Devices
- URL: http://arxiv.org/abs/2408.16835v1
- Date: Thu, 29 Aug 2024 18:01:04 GMT
- Title: Physical Security of Chip-Based Quantum Key Distribution Devices
- Authors: Friederike Jöhlinger, Henry Semenenko, Philip Sibson, Djeylan Aktas, John Rarity, Chris Erven, Siddarth Joshi, Imad Faruque,
- Abstract summary: This paper explores the Trojan horse attack (THA) using Measurement Device Independent (MDI) QKD integrated photonic chips.
We show that a monitor photodiode paired appropriately with enough optical isolation, given the sensitivity of the photodiode, can detect high power sniffing attacks.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The security proofs of the Quantum Key Distribution (QKD) protocols make certain assumptions about the operations of physical systems. Thus, appropriate modelling of devices to ensure that their operations are consistent with the models assumed in the security proof is imperative. In this paper, we explore the Trojan horse attack (THA) using Measurement Device Independent (MDI) QKD integrated photonic chips and how to avoid some of the security vulnerabilities using only on-chip components. We show that a monitor photodiode paired appropriately with enough optical isolation, given the sensitivity of the photodiode, can detect high power sniffing attacks. We also show that the placement of amplitude modulators with respect to back reflecting components and their switching time can be used to thwart a THA.
Related papers
- Device-independent secure correlations in sequential quantum scenarios [44.99833362998488]
Device-independent quantum information is attracting significant attention, particularly for its applications in information security.
We propose a systematic approach to designing sequential quantum protocols for device-independent security.
We analytically prove that, with this systematic construction, the resulting ideal correlations are secure in the sense that they cannot be reproduced as a statistical mixture of other correlations.
arXiv Detail & Related papers (2025-03-18T16:45:20Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Differential-phase-shift QKD with practical Mach-Zehnder interferometer [0.0]
We enhance the implementation security of the DPS protocol by incorporating a major imperfection in the measurement unit.
Our numerical simulations demonstrate that even with fluctuations of $pm0.5%$ in the transmittance from the ideal value, the key rate degrades only by a factor of 0.57.
arXiv Detail & Related papers (2024-05-20T03:38:02Z) - Fully passive Measurement Device Independent Quantum Key Distribution [15.545098722427678]
Measurement-device-independent quantum key distribution (MDI-QKD) can resist all attacks on the detection devices.
One possible solution is to use the passive protocol to eliminate the side channels introduced by active modulators at the source.
We propose a fully passive MDI-QKD scheme that can protect the system from both side channels of source modulators and attacks on the measurement devices.
arXiv Detail & Related papers (2023-09-14T10:18:52Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case [0.0]
Current security of QKD with detection-efficiency mismatch rely on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side.
Here we present a rigorous security proof without these assumptions and, thus, solve this important problem and prove the security of QKD with detection-efficiency mismatch against general attacks.
arXiv Detail & Related papers (2020-04-16T17:55:30Z) - Security proof of practical quantum key distribution with
detection-efficiency mismatch [3.1988884923120313]
We develop a method that allows to provide security proofs without the usual assumption.
Our method can take the detection-efficiency mismatch into account without having to restrict the attack strategy of the adversary.
Our method also shows that in the absence of efficiency mismatch in our detector model, the key rate increases if the loss due to detection inefficiency is assumed to be outside of the adversary's control.
arXiv Detail & Related papers (2020-04-09T06:49:29Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Hacking single-photon avalanche detector in quantum key distribution via
pulse illumination [6.285329211368446]
We show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch.
We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key.
arXiv Detail & Related papers (2020-02-21T06:05:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.