Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

被引:4
作者
Ko, Heasin [1 ,2 ]
Lim, Kyongchun [1 ]
Oh, Junsang [1 ]
Rhee, June-Koo Kevin [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Elect Engn, Daejeon 34141, South Korea
[2] Elect & Telecommun Res Inst, Daejeon, South Korea
关键词
Quantum key distribution; Side channel attack; Trojan horse attack; CRYPTOGRAPHY; SECURITY;
D O I
10.1007/s11128-016-1400-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
引用
收藏
页码:4265 / 4282
页数:18
相关论文
共 30 条
[1]  
Agrawal G.P., 2012, Fiber-Optic Communication Systems
[2]  
Aleksic S., 2013, NETWORK OPTICAL COMM, P11
[3]  
[Anonymous], PHYS REV A
[4]  
Bennett C H, 1984, P IEEE INT C COMP SY, V175, P175
[5]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)
[6]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[7]  
Holevo A S., 1973, Problems of Information Transmission, V9, P177
[8]   QUANTUM CRYPTOGRAPHY WITH COHERENT STATES [J].
HUTTNER, B ;
IMOTO, N ;
GISIN, N ;
MOR, T .
PHYSICAL REVIEW A, 1995, 51 (03) :1863-1869
[9]  
Jain N., 2015, IEEE J. Sel. Top. Quantum Electron, V21, P1
[10]   Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states [J].
Jiang, Mu-Sheng ;
Sun, Shi-Hai ;
Li, Chun-Yan ;
Liang, Lin-Mei .
PHYSICAL REVIEW A, 2012, 86 (03)