Trojan-horse attacks threaten the security of practical quantum cryptography

被引:138
作者
Jain, Nitin [1 ,3 ]
Anisimova, Elena [2 ]
Khan, Imran [1 ,3 ]
Makarov, Vadim [2 ]
Marquardt, Christoph [1 ,3 ]
Leuchs, Gerd [1 ,3 ]
机构
[1] Max Planck Inst Sci Light, D-91058 Erlangen, Germany
[2] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[3] Univ Erlangen Nurnberg, Inst Opt Informat & Photon, D-91058 Erlangen, Germany
关键词
quantum hacking; quantum key distribution; quantum cryptography; Trojan horse; security proofs; reflectometry; SYSTEM;
D O I
10.1088/1367-2630/16/12/123030
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's (secret) basis choice, and thus the raw key bit in the Scarani-Acin-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately, Eve's bright pulses have a side effect of causing a high level of afterpulsing in Bob's single-photon detectors, resulting in a large quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.
引用
收藏
页数:21
相关论文
共 40 条
[1]  
[Anonymous], 2010, ETSI GS QKD 005 V1 1
[2]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[3]  
Beller J., 1998, OTDRS BACKSCATTER ME
[4]   An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light [J].
Bethune, DS ;
Risk, WP .
IEEE JOURNAL OF QUANTUM ELECTRONICS, 2000, 36 (03) :340-347
[5]   Quantum nondemolition measurements: The route from toys to tools [J].
Braginsky, VB ;
Khalili, FY .
REVIEWS OF MODERN PHYSICS, 1996, 68 (01) :1-11
[6]   Security of two quantum cryptography protocols using the same four qubit states [J].
Branciard, C ;
Gisin, N ;
Kraus, B ;
Scarani, V .
PHYSICAL REVIEW A, 2005, 72 (03)
[7]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[8]   TRAPPING PHENOMENA IN AVALANCHE PHOTODIODES ON NANOSECOND SCALE [J].
COVA, S ;
LACAITA, A ;
RIPAMONTI, G .
IEEE ELECTRON DEVICE LETTERS, 1991, 12 (12) :685-687
[9]   Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems [J].
da Silva, Thiago Ferreira ;
Xavier, Guilherme B. ;
Temporao, Guilherme P. ;
von der Weid, Jean Pierre .
OPTICS EXPRESS, 2012, 20 (17) :18911-18924
[10]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)