Experimental Side Channel Analysis of BB84 QKD Source

نویسندگان

چکیده

A typical implementation of BB84 protocol for quantum communication uses four laser diodes transmitting weak coherent pulses, which may not have the same characteristics. We characterized these lasers mismatch in various parameters such as spectral width, pulse spatial mode, peak wavelength, polarization and their arrival times at receiver. This information is utilized to calculate possible leakage through side channel attacks by evaluating mutual between source eavesdropper. Based on our experimental observations cross correlation parameter values different diodes, we suggest methods reduce Eve.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Qkd Quantum Channel Authentication

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of...

متن کامل

Introducing FOBOS: Flexible Open-source BOard for Side-channel analysis

Side-channel analysis attacks pose a growing threat to implementations of cryptographic algorithms implemented in software as well as in hardware. Current standard side-channel evaluation boards with Field Programmable Gate Arrays (FPGAs), that allow for exploring the vulnerability of cryptographic implementations on FPGAs, are expensive and available only for a few FPGA devices. Furthermore, a...

متن کامل

Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous ...

متن کامل

Simulating BB84 Protocol in Dephasing Qubit Channel

BB84 protocol of quantum key distribution had been proved to be absolutely secure. We simulate the rate of secure key distribution in dephasing channel on a classical computer with the method of event-by-event simulation. Theoretically, the private classical capacity of dephasing channel can be obtained in principle, since the channel is degradable. We give the formula of capacity with respect ...

متن کامل

Side Channel Leakage Analysis

Nearly twenty years ago the discovery of side channel attacks has warned the world that security is more than just a mathematical problem. Serious considerations need to be placed on the implementation and its physical media. Nowadays the ever-growing ubiquitous computing calls for in-pace development of security solutions. Although the physical security has attracted increasing public attentio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal of Quantum Electronics

سال: 2021

ISSN: ['0018-9197', '1558-1713']

DOI: https://doi.org/10.1109/jqe.2021.3111332