Induced-Photorefraction Attack against Quantum Key Distribution

نویسندگان

چکیده

Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like key distribution (QKD), the characteristics of materials and their impact on practical systems must be intensively inquired. For first time, we reveal that photorefractive effect LN can utilized as a potential loophole to carry out malicious attacks by eavesdroppers. We take commercial LN-based variable optical attenuator an example demonstrate method named Induced-photorefractive attack (IPA) propose two techniques enable controllable attacks. Our results show eavesdroppers fulfill efficient source-side injecting optimized irradiation beam with only several nanowatts, which is realistic when accessing fiber channels. These measure employed all individual on-chip initially explored new security branch system design standardization real-life QKD.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phase-Remapping Attack in Practical Quantum Key Distribution Systems

Chi-Hang Fred Fung, ∗ Bing Qi, † Kiyoshi Tamaki, ‡ and Hoi-Kwong Lo § Center for Quantum Information and Quantum Control, Department of Electrical & Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario, Canada NTT Basic Research Laboratories, NTT corporation, 3-1,Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198; CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Sa...

متن کامل

A directional coupler attack against the Kish key distribution system

The Kish key distribution system has been proposed as a classical alternative to quantum key distribution. The idealized Kish scheme elegantly promises secure key distribution by exploiting thermal noise in a transmission line. However, it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission line connecting its endpoints. We introduce a novel attac...

متن کامل

Defeating Man-in-the-Middle Attack in Quantum Key Distribution

Quantum cryptosystems use some properties of quantum mechanics to create secret shared cryptographic keys that remain secret even against an eavesdropper with an access to unlimited computational power. All quantum key distribution (QKD) protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from ...

متن کامل

Saturation Attack on Continuous-Variable Quantum Key Distribution System

Introduction Quantum key distribution (QKD) [1] enables two remote parties Alice and Bob to share common secure keys which are unknown to a potential eavesdropper. Unconditional security of QKD is based on the fundamental laws of quantum mechanics, but in reality, securities of practical QKD systems could be jeopardized by physical implementations. In discretevariable (DV) QKD system, due to de...

متن کامل

Detection of blinding attack in quantum key distribution

Security of an ideal system for quantum key distribution can be formally proved. However, technological imperfections of real systems can be misused by an eavesdropper to get information about the key without causing a detectable change in the error rate. An example of this is the blinding attack where the eavesdropper manipulates detectors of the receiving party. To avoid such an attack, techn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical review applied

سال: 2023

ISSN: ['2331-7043', '2331-7019']

DOI: https://doi.org/10.1103/physrevapplied.19.054052