Countermeasure against tailored bright illumination attack for DPS-QKD.

نویسندگان

  • Toshimori Honjo
  • Mikio Fujiwara
  • Kaoru Shimizu
  • Kiyoshi Tamaki
  • Shigehito Miki
  • Taro Yamashita
  • Hirotaka Terai
  • Zhen Wang
  • Masahide Sasaki
چکیده

We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also experimentally confirmed the feasibility of this countermeasure using our 1 GHz-clocked DPS-QKD system. In the emulation of the attack, we achieved much lower power of the bright illumination light compared with the original demonstration by using a pulse stream instead of broad pulses.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thermal blinding of gated detectors in quantum cryptography.

It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [Nat. Photonics 4, 686 (2010)]. This allows for an attack eavesdropping the full raw and secret key without increasing ...

متن کامل

Trojan-horse attacks threaten the security of practical quantum cryptography

A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the backreflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID Quantique, as a proof-of-principle. With just a few back-reflected ph...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

European Quantum Key Distribution Network

Information is one of the key assets of our society. Secure communication is vital for economy, national and international stability. Quantum key distribution (QKD) has closed a remaining security loophole in classical information science, namely the secure cryptographic key exchange. In the past 27 years since the invention of QKD a lot of effort has been invested to bring QKD to practical app...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Optics express

دوره 21 3  شماره 

صفحات  -

تاریخ انتشار 2013