English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT

Released

Journal Article

Trojan-horse attacks threaten the security of practical quantum cryptography

MPS-Authors
/persons/resource/persons201098

Jain,  Nitin
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201106

Khan,  Imran
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201126

Marquardt,  Christoph
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201115

Leuchs,  Gerd
Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

External Resource
No external resources are shared
Fulltext (restricted access)
There are currently no full texts shared for your IP range.
Fulltext (public)
There are no public fulltexts stored in PuRe
Supplementary Material (public)
There is no public supplementary material available
Citation

Jain, N., Anisimova, E., Khan, I., Makarov, V., Marquardt, C., & Leuchs, G. (2014). Trojan-horse attacks threaten the security of practical quantum cryptography. NEW JOURNAL OF PHYSICS, 16: 123030. doi:10.1088/1367-2630/16/12/123030.


Cite as: https://hdl.handle.net/11858/00-001M-0000-002D-6470-7
Abstract
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the back-reflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bob's (secret) basis choice, and thus the raw key bit in the Scarani-Acin-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately, Eve's bright pulses have a side effect of causing a high level of afterpulsing in Bob's single-photon detectors, resulting in a large quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2-like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.