Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system
- URL: http://arxiv.org/abs/2409.08017v1
- Date: Thu, 12 Sep 2024 13:00:09 GMT
- Title: Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system
- Authors: Yiliang Wang, Yi Zheng, Chenlei Fang, Haobin Shi, Wei Pan,
- Abstract summary: We explore a new security loophole in a practical continuous-variable quantum key distribution (CVQKD) system, which is opened by the photorefractive effect of lithium niobate-based (LN-based) modulators.
We propose a quantum hacking strategy, i.e., the induced-photorefraction attack, which utilizes the induced photorefraction on the LN-based modulators to hide the classical intercept-resend attack.
- Score: 12.232821041222591
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We explore a new security loophole in a practical continuous-variable quantum key distribution (CVQKD) system, which is opened by the photorefractive effect of lithium niobate-based (LN-based) modulators. By exploiting this loophole, we propose a quantum hacking strategy, i.e., the induced-photorefraction attack, which utilizes the induced photorefraction on the LN-based modulators to hide the classical intercept-resend attack. Specifically, we show that the induced photorefraction can bias the response curve of the LN-based modulator, which will affect the intensity of the modulated signal. Based on the investigation of the channel parameter estimation under above influence, we further analyze the secret key rate of the practical CVQKD system. The simulation results indicate that the communication parties will overestimate the secret key rate, which reveals that Eve can actively open the above loophole by launching the induced-photorefraction attack to successfully obtain the secret key information. To defend against this attack, we can use a random monitoring scheme for modulation variance to determine this attack, and use an improving optical power limiter to effectively mitigate the irradiation beam. Apart from these countermeasures, we also propose using the Sagnac-based IM to stabilize the practical CVQKD system, which can minimize the above effects.
Related papers
- Proof-of-principle experimental demonstration of quantum secure imaging based on quantum key distribution [6.514809059861059]
We present a quantum secure imaging (QSI) scheme based on the phase encoding and weak + vacuum decoy-state BB84 protocol of quantum key distribution (QKD)
In the experiment, we obtained the image of the object quickly and efficiently by measuring the signal photon counts with single-photon detector (SPD)
Our imaging system uses a laser with invisible wavelength of 1550 nm, whose intensity is low as single-photon, that can realize weak-light imaging and is immune to the stray light or air turbulence, thus it will become a better choice for quantum security radar against intercept-resend jamming attacks
arXiv Detail & Related papers (2024-10-02T01:59:14Z) - Security Loophole Induced by Photorefractive Effect in Continous-variable Quantum Key Distribution System [4.7922744779403015]
We analyzed the security loophole of CVQKD under the photorefractive effect (PE)
It is found that the refractive index change of modulators because of PE may lead to an overestimate or underestimate of the final secret key rate.
arXiv Detail & Related papers (2024-08-31T16:25:54Z) - Impact of polarization mode dispersion on entangled photon distribution [34.82692226532414]
Polarization mode dispersion (PMD) in optical fibers poses a major challenge for maintaining the fidelity of quantum states for quantum communications.
Our research proposes effective methods to mitigate PMD effects for broadband entangled photons and evaluates the impact of higher-order PMD effects.
arXiv Detail & Related papers (2024-08-03T11:29:45Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Effect of light injection on the security of practical quantum key
distribution [15.80376879485642]
Quantum key distribution (QKD) based on the fundamental laws of quantum physics can allow the distribution of secure keys between distant users.
We find that optical modulators based on LiNbO3, including phase modulators and intensity modulators, are vulnerable to photorefractive effect caused by external light injection.
We have experimentally demonstrated the influence of light injection on LiNbO3-based optical modulators and analyzed the security risks caused by the potential green light injection attack, along with the corresponding countermeasures.
arXiv Detail & Related papers (2023-03-26T11:22:15Z) - Induced-photorefractive attack against Quantum Key Distribution [8.375303793663315]
Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing.
For the first time, we reveal that the photorefractive effect in LN can be utilized as a potential loophole to carry out malicious attacks by the eavesdroppers.
arXiv Detail & Related papers (2023-03-20T06:05:39Z) - Protecting the quantum interference of cat states by phase-space
compression [45.82374977939355]
Cat states with their unique phase-space interference properties are ideal candidates for understanding quantum mechanics.
They are highly susceptible to photon loss, which inevitably diminishes their quantum non-Gaussian features.
Here, we protect these non-Gaussian features by compressing the phase-space distribution of a cat state.
arXiv Detail & Related papers (2022-12-02T16:06:40Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Performance of teleportation-based error correction circuits for bosonic
codes with noisy measurements [58.720142291102135]
We analyze the error-correction capabilities of rotation-symmetric codes using a teleportation-based error-correction circuit.
We find that with the currently achievable measurement efficiencies in microwave optics, bosonic rotation codes undergo a substantial decrease in their break-even potential.
arXiv Detail & Related papers (2021-08-02T16:12:13Z) - Fibre polarization state compensation in entanglement-based quantum key
distribution [62.997667081978825]
Quantum Key Distribution (QKD) using polarisation encoding can be hard to implement over deployed telecom fibres.
We show a technique for dynamically compensating fibre-induced alteration in a QKD system over deployed fibre.
arXiv Detail & Related papers (2021-07-16T00:53:48Z) - Modulation leakage vulnerability in continuous-variable quantum key
distribution [0.5863360388454261]
We report a modulation leakage vulnerability in a quantum key distribution system.
The leakage arises from the limited suppression of a quantum-information-carrying sideband during modulation.
Our results indicate that the leakage reduces the range over which a positive secret key can be obtained, and can even lead to a security breach.
arXiv Detail & Related papers (2021-03-26T16:28:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.