English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT
 
 
DownloadE-Mail
  Quantum key distribution - vulnerable if imperfectly implemented

Leuchs, G. (2013). Quantum key distribution - vulnerable if imperfectly implemented. In EMERGING TECHNOLOGIES IN SECURITY AND DEFENCE; AND QUANTUM SECURITY II; AND UNMANNED SENSOR SYSTEMS X. 1000 20TH ST, PO BOX 10, BELLINGHAM, WA 98227-0010 USA: SPIE-INT SOC OPTICAL ENGINEERING. doi:10.1117/12.2033066.

Item is

Files

show Files

Locators

show

Creators

show
hide
 Creators:
Leuchs, G.1, Author           
Affiliations:
1Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society, ou_2364698              

Content

show
hide
Free keywords: CRYPTOGRAPHY; SYSTEMS; ATTACKComputer Science; Remote Sensing; Optics; quantum; cryptography; key distribution; hacking; vulnerabilities; imperfections; single-photon detector;
 Abstract: We report several vulnerabilities found in Clavis2, the flagship quantum key distribution (QKD) system from ID Quantique. We show the hacking of a calibration sequence run by Clavis2 to synchronize the Alice and Bob devices before performing the secret key exchange. This hack induces a temporal detection efficiency mismatch in Bob that can allow Eve to break the security of the cryptosystem using faked states. We also experimentally investigate the superlinear behaviour in the single-photon detectors (SPDs) used by Bob. Due to this superlinearity, the SPDs feature an actual multi-photon detection probability which is generally higher than the theoretically-modelled value. We show how this increases the risk of detector control attacks on QKD systems (including Clavis2) employing such SPDs Finally, we review the experimental feasibility of Trojan-horse attacks. In the case of Clavis2, the objective is to read Bob's phase modulator to acquire knowledge of his basis choice as this information suffices for constructing the raw key in the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol. We work in close collaboration with ID Quantique and for all these loopholes, we notified them in advance. Wherever possible, we or ID Quantique proposed countermeasures and they implemented suitable patches and upgrade their systems.

Details

show
hide
Language(s): eng - English
 Dates: 2013
 Publication Status: Published online
 Pages: 10
 Publishing info: -
 Table of Contents: -
 Rev. Type: -
 Identifiers: ISI: 000327193600012
DOI: 10.1117/12.2033066
 Degree: -

Event

show
hide
Title: Conference on Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X
Place of Event: Dresden, GERMANY
Start-/End Date: 2013-09-23 - 2013-09-26

Legal Case

show

Project information

show

Source 1

show
hide
Title: EMERGING TECHNOLOGIES IN SECURITY AND DEFENCE; AND QUANTUM SECURITY II; AND UNMANNED SENSOR SYSTEMS X
  Alternative Title : PROC SPIE
Source Genre: Proceedings
 Creator(s):
Affiliations:
Publ. Info: 1000 20TH ST, PO BOX 10, BELLINGHAM, WA 98227-0010 USA : SPIE-INT SOC OPTICAL ENGINEERING
Pages: SPIE Volume / Issue: - Sequence Number: UNSP 88990L Start / End Page: - Identifier: ISSN: 0277-786X
ISBN: 978-0-8194-9768-0

Source 2

show
hide
Title: Proceedings of SPIE
  Alternative Title : PROC SPIE
Source Genre: Series
 Creator(s):
Affiliations:
Publ. Info: -
Pages: - Volume / Issue: 8899 Sequence Number: - Start / End Page: - Identifier: ISSN: 0277-786X