日本語
 
Help Privacy Policy ポリシー/免責事項
  詳細検索ブラウズ

アイテム詳細

  Quantum key distribution - vulnerable if imperfectly implemented

Leuchs, G. (2013). Quantum key distribution - vulnerable if imperfectly implemented. In EMERGING TECHNOLOGIES IN SECURITY AND DEFENCE; AND QUANTUM SECURITY II; AND UNMANNED SENSOR SYSTEMS X. 1000 20TH ST, PO BOX 10, BELLINGHAM, WA 98227-0010 USA: SPIE-INT SOC OPTICAL ENGINEERING. doi:10.1117/12.2033066.

Item is

基本情報

表示: 非表示:
資料種別: 会議論文

ファイル

表示: ファイル

関連URL

表示:

作成者

表示:
非表示:
 作成者:
Leuchs, G.1, 著者           
所属:
1Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society, ou_2364698              

内容説明

表示:
非表示:
キーワード: CRYPTOGRAPHY; SYSTEMS; ATTACKComputer Science; Remote Sensing; Optics; quantum; cryptography; key distribution; hacking; vulnerabilities; imperfections; single-photon detector;
 要旨: We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

資料詳細

表示:
非表示:
言語: eng - English
 日付: 2013
 出版の状態: オンラインで出版済み
 ページ: 10
 出版情報: -
 目次: -
 査読: -
 識別子(DOI, ISBNなど): ISI: 000327193600012
DOI: 10.1117/12.2033066
 学位: -

関連イベント

表示:
非表示:
イベント名: Conference on Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X
開催地: Dresden, GERMANY
開始日・終了日: 2013-09-23 - 2013-09-26

訴訟

表示:

Project information

表示:

出版物 1

表示:
非表示:
出版物名: EMERGING TECHNOLOGIES IN SECURITY AND DEFENCE; AND QUANTUM SECURITY II; AND UNMANNED SENSOR SYSTEMS X
  出版物の別名 : PROC SPIE
種別: 会議論文集
 著者・編者:
所属:
出版社, 出版地: 1000 20TH ST, PO BOX 10, BELLINGHAM, WA 98227-0010 USA : SPIE-INT SOC OPTICAL ENGINEERING
ページ: SPIE 巻号: - 通巻号: UNSP 88990L 開始・終了ページ: - 識別子(ISBN, ISSN, DOIなど): ISSN: 0277-786X
ISBN: 978-0-8194-9768-0

出版物 2

表示:
非表示:
出版物名: Proceedings of SPIE
  出版物の別名 : PROC SPIE
種別: 連載記事
 著者・編者:
所属:
出版社, 出版地: -
ページ: - 巻号: 8899 通巻号: - 開始・終了ページ: - 識別子(ISBN, ISSN, DOIなど): ISSN: 0277-786X