File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1117/12.730776
- Scopus: eid_2-s2.0-42149154899
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Quantum hacking: Attacking practical quantum key distribution systems
Title | Quantum hacking: Attacking practical quantum key distribution systems |
---|---|
Authors | |
Keywords | Single photon detector Quantum key distribution Phase modulation Efficiency |
Issue Date | 2007 |
Citation | Proceedings of SPIE - The International Society for Optical Engineering, 2007, v. 6710 How to Cite? |
Abstract | Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and violate some of the assumptions in a security proof. Here, we report two types of eavesdropping attacks against a practical QKD system. The first one is "time-shift" attack, which is applicable to QKD systems with gated single photon detectors (SPDs). In this attack, the eavesdropper, Eve, exploits the time mismatch between the open windows of the two SPDs. She can acquire a significant amount of information on the final key by simply shifting the quantum signals forwards or backwards in time domain. Our experimental results in [9] with a commercial QKD system demonstrate that, under this attack, the original QKD system is breakable. This is the first experimental demonstration of a feasible attack against a commercial QKD system. This is a surprising result. The second one is "phase-remapping" attack [10]. Here, Eve exploits the fact that a practical phase modulator has a finite response time. In principle, Eve could change the encoded phase value by timeshifting the signal pulse relative to the reference pulse. |
Persistent Identifier | http://hdl.handle.net/10722/285620 |
ISSN | 2023 SCImago Journal Rankings: 0.152 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Fung, Chi Hang Fred | - |
dc.contributor.author | Zhao, Yi | - |
dc.contributor.author | Ma, Xiongfeng | - |
dc.contributor.author | Tamaki, Kiyoshi | - |
dc.contributor.author | Chen, Christine | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:13Z | - |
dc.date.available | 2020-08-18T04:56:13Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Proceedings of SPIE - The International Society for Optical Engineering, 2007, v. 6710 | - |
dc.identifier.issn | 0277-786X | - |
dc.identifier.uri | http://hdl.handle.net/10722/285620 | - |
dc.description.abstract | Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and violate some of the assumptions in a security proof. Here, we report two types of eavesdropping attacks against a practical QKD system. The first one is "time-shift" attack, which is applicable to QKD systems with gated single photon detectors (SPDs). In this attack, the eavesdropper, Eve, exploits the time mismatch between the open windows of the two SPDs. She can acquire a significant amount of information on the final key by simply shifting the quantum signals forwards or backwards in time domain. Our experimental results in [9] with a commercial QKD system demonstrate that, under this attack, the original QKD system is breakable. This is the first experimental demonstration of a feasible attack against a commercial QKD system. This is a surprising result. The second one is "phase-remapping" attack [10]. Here, Eve exploits the fact that a practical phase modulator has a finite response time. In principle, Eve could change the encoded phase value by timeshifting the signal pulse relative to the reference pulse. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of SPIE - The International Society for Optical Engineering | - |
dc.subject | Single photon detector | - |
dc.subject | Quantum key distribution | - |
dc.subject | Phase modulation | - |
dc.subject | Efficiency | - |
dc.title | Quantum hacking: Attacking practical quantum key distribution systems | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1117/12.730776 | - |
dc.identifier.scopus | eid_2-s2.0-42149154899 | - |
dc.identifier.volume | 6710 | - |
dc.identifier.spage | null | - |
dc.identifier.epage | null | - |
dc.identifier.issnl | 0277-786X | - |