Realistic vulnerabilities of decoy-state quantum key distribution
- URL: http://arxiv.org/abs/2507.15446v1
- Date: Mon, 21 Jul 2025 09:58:01 GMT
- Title: Realistic vulnerabilities of decoy-state quantum key distribution
- Authors: I. S. Sushchev, K. E. Bugai, S. N. Molotkov, D. S. Bulavkin, A. S. Sidelnikova, D. M. Melkonian, V. M. Vakhrusheva, R. Yu. Lokhmatov, D. A. Dvoretskiy,
- Abstract summary: decoy-state quantum key distribution (QKD) is designed to protect against photon-number-splitting and beam-splitting attacks.<n>We analyze realistic vulnerabilities of QKD arising from the combination of laser damage attack (LDA) and unambiguous state discrimination (USD)
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We analyze realistic vulnerabilities of decoy-state quantum key distribution (QKD) arising from the combination of laser damage attack (LDA) and unambiguous state discrimination (USD). While decoy-state QKD is designed to protect against photon-number-splitting and beam-splitting attacks by accurately estimating the single-photon fraction, it relies on stable attenuation to prepare pulses with fixed mean-photon numbers. An eavesdropper (Eve) can exploit LDA to irreversibly alter the optical components on Alice's side, effectively increasing the mean-photon numbers beyond the decoy-state security regime. We show that once the alteration exceeds a critical threshold - on the order of 10--20 dB - Eve can implement an efficient USD-based intercept-resend strategy using current off-the-shelf technology, thus obtaining the entire secret key. Numerical simulations confirm that for sufficiently elevated mean-photon numbers, Eve's conclusive measurement outcomes skew the decoy-state statistics, yet remain undetected by standard security checks. We further demonstrate how a modified USD setup employing an additional beam splitter can reduce the required threshold, facilitating Eve's attack. Our findings emphasize the need for robust safeguards against high-power laser damage in QKD systems, including careful hardware selection, rigorous testing under high-power illumination, and real-time monitoring to ensure the integrity of the decoy-state protocol.
Related papers
- Performance and Storage Analysis of CRYSTALS Kyber as a Post Quantum Replacement for RSA and ECC [49.1574468325115]
CRYSTALS-Kyber is a post-quantum cryptographic solution standardized by NIST in 2022.<n>This study evaluates Kyber's practical viability through performance testing across various implementation schemes.
arXiv Detail & Related papers (2025-08-03T09:53:45Z) - Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.<n>We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - Overcoming Intensity Limits for Long-Distance Quantum Key Distribution [0.0]
Quantum Key Distribution (QKD) enables the sharing of cryptographic keys secured by quantum mechanics.<n> BB84 protocol assumed single-photon sources, but practical systems rely on weak coherent pulses vulnerable to photon-number-splitting (PNS) attacks.<n>We develop a new approach to security in QKD by shifting from worst-case assumption analysis to observation-dependent inference.
arXiv Detail & Related papers (2024-12-28T20:40:23Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.<n>Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.<n>We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.<n>We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system [12.232821041222591]
We explore a new security loophole in a practical continuous-variable quantum key distribution (CVQKD) system, which is opened by the photorefractive effect of lithium niobate-based (LN-based) modulators.
We propose a quantum hacking strategy, i.e., the induced-photorefraction attack, which utilizes the induced photorefraction on the LN-based modulators to hide the classical intercept-resend attack.
arXiv Detail & Related papers (2024-09-12T13:00:09Z) - Hacking coherent-one-way quantum key distribution with present-day technology [0.0]
Recent results have shown that the secret-key rate of coherent-one-way (COW) quantum key distribution (QKD) scales quadratically with the system's transmittance.
This was proven by using a so-called zero-error attack, which relies on an unambiguous state discrimination (USD) measurement.
Here, we investigate the feasibility and effectiveness of zero-error attacks against COW QKD with present-day technology.
arXiv Detail & Related papers (2024-06-19T18:16:29Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Security of the decoy-state BB84 protocol with imperfect state
preparation [0.0]
We study the security of the efficient decoy-state BB84 QKD protocol in the presence of source flaws.
We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation.
arXiv Detail & Related papers (2023-10-02T19:59:57Z) - Mitigating the source-side channel vulnerability by characterization of
photon statistics [1.3458279593461016]
Quantum key distribution (QKD) theoretically offers unconditional security.
Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems.
We aim to bridge the gap between theory and practice to achieve information-theoretic security.
arXiv Detail & Related papers (2023-08-28T08:37:59Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.