Quantum man-in-the-middle attack on the calibration process of quantum key distribution

被引:26
作者
Fei, Yang-Yang [1 ]
Meng, Xiang-Dong [1 ]
Gao, Ming [1 ]
Wang, Hong [1 ]
Ma, Zhi [1 ,2 ,3 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[2] Univ Sci & Technol China, CAS Ctr Excellence, Hefei 230026, Anhui, Peoples R China
[3] Univ Sci & Technol China, Synerget Innovat Ctr Quantum Informat & Quantum P, Hefei 230026, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
STATES ATTACK; SECURITY; DETECTOR; CRYPTOGRAPHY; PROOF; TIME;
D O I
10.1038/s41598-018-22700-3
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process.
引用
收藏
页数:10
相关论文
共 46 条
[1]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[2]   Continuous operation of high bit rate quantum key distribution [J].
Dixon, A. R. ;
Yuan, Z. L. ;
Dynes, J. F. ;
Sharpe, A. W. ;
Shields, A. J. .
APPLIED PHYSICS LETTERS, 2010, 96 (16)
[3]   Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch [J].
Fei, Yangyang ;
Gao, Ming ;
Wang, Weilong ;
Li, Chaobo ;
Ma, Zhi .
PHYSICAL REVIEW A, 2015, 91 (05)
[4]   Phase-remapping attack in practical quantum-key-distribution systems [J].
Fung, Chi-Hang Fred ;
Qi, Bing ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
PHYSICAL REVIEW A, 2007, 75 (03)
[5]  
Fung CHF, 2009, QUANTUM INF COMPUT, V9, P131
[6]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)
[7]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[8]  
Gottesman D., 2004, INF THEOR ISIT2004 P, V136
[9]   QUANTUM CRYPTOGRAPHY WITH COHERENT STATES [J].
HUTTNER, B ;
IMOTO, N ;
GISIN, N ;
MOR, T .
PHYSICAL REVIEW A, 1995, 51 (03) :1863-1869
[10]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014