Countermeasures for Trojan-Horse Attacks on self-compensating all-fiber polarization modulator
- URL: http://arxiv.org/abs/2510.16868v1
- Date: Sun, 19 Oct 2025 14:58:20 GMT
- Title: Countermeasures for Trojan-Horse Attacks on self-compensating all-fiber polarization modulator
- Authors: Alberto De Toni, Aynur Cemre Aka, Costantino Agnesi, Davide Giacomo Marangon, Giuseppe Vallone, Paolo Villoresi,
- Abstract summary: Quantum Key Distribution (QKD) leverages the principles of quantum mechanics to exchange a secret key between two parties.<n>In a QKD protocol, any attempt by an eavesdropper to intercept the key is detectable.<n>We study the vulnerabilities against THAs of the iPOGNAC encoder, first introduced in Avesani, Agnesi et al.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum Key Distribution (QKD) leverages the principles of quantum mechanics to exchange a secret key between two parties. Unlike classical cryptographic systems, the security of QKD is not reliant on computational assumptions but is instead rooted in the fundamental laws of physics. In a QKD protocol, any attempt by an eavesdropper to intercept the key is detectable: this provides an unprecedented level of security, making QKD an attractive solution for secure communication in an era increasingly threatened by the advent of quantum computers and their potential to break classical cryptographic systems. However, QKD also faces several practical challenges such as transmission loss and noise in quantum channels, finite key size effects, and implementation flaws in QKD devices. Addressing these issues is crucial for the large-scale deployment of QKD and the realization of a global quantum internet. A whole body of research is dedicated to the hacking of the quantum states source, for example using Trojan-Horse attacks (THAs), where the eavesdropper injects light into the system and analyzes the back-reflected signal. In this paper, we study the vulnerabilities against THAs of the iPOGNAC encoder, first introduced in Avesani, Agnesi et al., to propose adapted countermeasures that can mitigate such attacks.
Related papers
- The practical issues of side-channel-secure quantum key distribution [1.8320917411261535]
Quantum Key Distribution (QKD) leverages the principles of quantum mechanics to provide theoretically unconditional security for cryptographic key sharing.<n>Practical implementations remain vulnerable due to non-ideal devices and potential security loopholes at both the source and detection sides of QKD systems.<n>The side-channel-secure (SCS) protocol addresses these challenges by encoding bits in vacuum and non-vacuum states and introducing a third-party measurement node.
arXiv Detail & Related papers (2025-08-21T03:14:26Z) - Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies [36.14072181405793]
Low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy.<n>To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity.<n>Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN.
arXiv Detail & Related papers (2025-07-20T04:43:33Z) - Post-Quantum Cryptography: An Analysis of Code-Based and Lattice-Based Cryptosystems [55.49917140500002]
Quantum computers will be able to break modern cryptographic systems using Shor's Algorithm.<n>We first examine the McEliece cryptosystem, a code-based scheme believed to be secure against quantum attacks.<n>We then explore NTRU, a lattice-based system grounded in the difficulty of solving the Shortest Vector Problem.
arXiv Detail & Related papers (2025-05-06T03:42:38Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - QKD Entity Source Authentication: Defense-in-Depth for Post Quantum
Cryptography [0.0]
Quantum key distribution (QKD) was conceived by Charles Bennett and Gilles Brassard in December of 1984.
NIST began a program to standardize a series of quantum resistant algorithms to replace our current encryption standards.
The goal of this paper is to examine the suitability of a hybrid QKD / PQC defense-in-depth strategy.
arXiv Detail & Related papers (2023-11-17T16:43:32Z) - Advances in device-independent quantum key distribution [8.155166479336625]
Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange.
Recent theoretical and experimental efforts have led to the first proof-of-principle DI-QKD implementations.
arXiv Detail & Related papers (2022-08-26T18:55:40Z) - Quantum hacking perceiving for quantum key distribution using temporal
ghost imaging [7.7270491671042425]
Quantum key distribution (QKD) can generate secure key bits between remote users with quantum mechanics.
The most insidious attacks, known as quantum hacking, are the ones with no significant discrepancy of the measurement results.
We propose the method exploring temporal ghost imaging (TGI) scheme to perceive quantum hacking with temporal fingerprints.
arXiv Detail & Related papers (2020-12-28T02:21:09Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.