Induced-Photorefraction Attack against Quantum Key Distribution
نویسندگان
چکیده
Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like key distribution (QKD), the characteristics of materials and their impact on practical systems must be intensively inquired. For first time, we reveal that photorefractive effect LN can utilized as a potential loophole to carry out malicious attacks by eavesdroppers. We take commercial LN-based variable optical attenuator an example demonstrate method named Induced-photorefractive attack (IPA) propose two techniques enable controllable attacks. Our results show eavesdroppers fulfill efficient source-side injecting optimized irradiation beam with only several nanowatts, which is realistic when accessing fiber channels. These measure employed all individual on-chip initially explored new security branch system design standardization real-life QKD.
منابع مشابه
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
Chi-Hang Fred Fung, ∗ Bing Qi, † Kiyoshi Tamaki, ‡ and Hoi-Kwong Lo § Center for Quantum Information and Quantum Control, Department of Electrical & Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario, Canada NTT Basic Research Laboratories, NTT corporation, 3-1,Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198; CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Sa...
متن کاملA directional coupler attack against the Kish key distribution system
The Kish key distribution system has been proposed as a classical alternative to quantum key distribution. The idealized Kish scheme elegantly promises secure key distribution by exploiting thermal noise in a transmission line. However, it is vulnerable to nonidealities in its components, such as the finite resistance of the transmission line connecting its endpoints. We introduce a novel attac...
متن کاملDefeating Man-in-the-Middle Attack in Quantum Key Distribution
Quantum cryptosystems use some properties of quantum mechanics to create secret shared cryptographic keys that remain secret even against an eavesdropper with an access to unlimited computational power. All quantum key distribution (QKD) protocols require that the parties have access to an authentic channel. Otherwise, QKD is vulnerable to man-in-the-middle attacks. This paper studies QKD from ...
متن کاملSaturation Attack on Continuous-Variable Quantum Key Distribution System
Introduction Quantum key distribution (QKD) [1] enables two remote parties Alice and Bob to share common secure keys which are unknown to a potential eavesdropper. Unconditional security of QKD is based on the fundamental laws of quantum mechanics, but in reality, securities of practical QKD systems could be jeopardized by physical implementations. In discretevariable (DV) QKD system, due to de...
متن کاملDetection of blinding attack in quantum key distribution
Security of an ideal system for quantum key distribution can be formally proved. However, technological imperfections of real systems can be misused by an eavesdropper to get information about the key without causing a detectable change in the error rate. An example of this is the blinding attack where the eavesdropper manipulates detectors of the receiving party. To avoid such an attack, techn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical review applied
سال: 2023
ISSN: ['2331-7043', '2331-7019']
DOI: https://doi.org/10.1103/physrevapplied.19.054052