Quantum Pulse Gate Attack on IM/DD Optical Key Distribution Exploiting Symbol Shape Distortion
- URL: http://arxiv.org/abs/2503.14105v1
- Date: Tue, 18 Mar 2025 10:19:35 GMT
- Title: Quantum Pulse Gate Attack on IM/DD Optical Key Distribution Exploiting Symbol Shape Distortion
- Authors: M. Jarzyna, M. Jachura, K. Banaszek,
- Abstract summary: Intensity modulation/direct detection (IM/DD) optical key distribution (OKD) is a method to generate a secret key.<n>Here the effects of intensity-dependent symbol shape distortion on the IM/DD OKD security are investigated.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Intensity modulation/direct detection (IM/DD) optical key distribution (OKD) is a method to generate a secret key whose security against passive eavesdropping is guaranteed by the shot noise inherent to the photodetection process. Here the effects of intensity-dependent symbol shape distortion on the IM/DD OKD security are investigated assuming that the eavesdropper can implement temporal mode demultiplexing using e.g the quantum pulse gating technique. The quantitative analysis includes key generation based on either hard- or soft-decoding of the detected signal as well as the impact of excess detection noise. A simple rule-of-thumb relation between the severity of the symbol shape distortion and the signal strength required to ensure key security is presented.
Related papers
- Plug-and-Hide: Provable and Adjustable Diffusion Generative Steganography [40.357567971092564]
Generative Steganography (GS) is a technique that utilizes generative models to conceal messages without relying on cover images.
GS algorithms leverage the powerful generative capabilities of Diffusion Models (DMs) to create high-fidelity stego images.
In this paper, we rethink the trade-off among image quality, steganographic security, and message extraction accuracy within Diffusion Generative Steganography (DGS) settings.
arXiv Detail & Related papers (2024-09-07T18:06:47Z) - Security Loophole Induced by Photorefractive Effect in Continous-variable Quantum Key Distribution System [4.7922744779403015]
We analyzed the security loophole of CVQKD under the photorefractive effect (PE)
It is found that the refractive index change of modulators because of PE may lead to an overestimate or underestimate of the final secret key rate.
arXiv Detail & Related papers (2024-08-31T16:25:54Z) - Physical Security of Chip-Based Quantum Key Distribution Devices [0.0]
This paper explores the Trojan horse attack (THA) using Measurement Device Independent (MDI) QKD integrated photonic chips.
We show that a monitor photodiode paired appropriately with enough optical isolation, given the sensitivity of the photodiode, can detect high power sniffing attacks.
arXiv Detail & Related papers (2024-08-29T18:01:04Z) - Wavelet-based Bi-dimensional Aggregation Network for SAR Image Change Detection [53.842568573251214]
Experimental results on three SAR datasets demonstrate that our WBANet significantly outperforms contemporary state-of-the-art methods.
Our WBANet achieves 98.33%, 96.65%, and 96.62% of percentage of correct classification (PCC) on the respective datasets.
arXiv Detail & Related papers (2024-07-18T04:36:10Z) - Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - Quantifying Noise of Dynamic Vision Sensor [49.665407116447454]
Dynamic visual sensors (DVS) are characterised by a large amount of background activity (BA) noise.
It is difficult to distinguish between noise and the cleaned sensor signals using standard image processing techniques.
A new technique is presented to characterise BA noise derived from the Detrended Fluctuation Analysis (DFA)
arXiv Detail & Related papers (2024-04-02T13:43:08Z) - FS-BAND: A Frequency-Sensitive Banding Detector [55.59101150019851]
Banding artifact, as known as staircase-like contour, is a common quality annoyance that happens in compression, transmission, etc.
We propose a no-reference banding detection model to capture and evaluate banding artifacts, called the Frequency-Sensitive BANding Detector (FS-BAND)
Experimental results show that the proposed FS-BAND method outperforms state-of-the-art image quality assessment (IQA) approaches with higher accuracy in banding classification task.
arXiv Detail & Related papers (2023-11-30T03:20:42Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Information Rates with Non Ideal Photon Detectors in Time-Entanglement
Based QKD [7.207027899499879]
We address photon detection timing jitter, detector downtime, and photon dark counts and show how each may decrease the maximum achievable secret key rate in different ways.
One of our main results is providing tooling for experimentalists to predict their systems' achievable secret key rate given the detector specifications.
arXiv Detail & Related papers (2022-07-08T22:25:43Z) - Dual Spoof Disentanglement Generation for Face Anti-spoofing with Depth
Uncertainty Learning [54.15303628138665]
Face anti-spoofing (FAS) plays a vital role in preventing face recognition systems from presentation attacks.
Existing face anti-spoofing datasets lack diversity due to the insufficient identity and insignificant variance.
We propose Dual Spoof Disentanglement Generation framework to tackle this challenge by "anti-spoofing via generation"
arXiv Detail & Related papers (2021-12-01T15:36:59Z) - Optimization of intensity-modulation/direct-detection optical key
distribution under passive eavesdropping [0.0]
We analyze theoretically optimal operation of an optical key distribution link based on fine intensity modulation of an optical signal transmitted over an attenuating channel to a direct detection receiver.
With suitable digital postprocessing, the users may generate a secret key that will be unknown to an unauthorized party collecting passively a fraction of the signal that escapes detection by the legitimate recipient.
The security is ensured by the presence of the shot noise that inevitably accompanies eavesdropper's attempt to detect the collected signal.
arXiv Detail & Related papers (2021-09-25T10:51:15Z) - WaveTransform: Crafting Adversarial Examples via Input Decomposition [69.01794414018603]
We introduce WaveTransform', that creates adversarial noise corresponding to low-frequency and high-frequency subbands, separately (or in combination)
Experiments show that the proposed attack is effective against the defense algorithm and is also transferable across CNNs.
arXiv Detail & Related papers (2020-10-29T17:16:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.