# Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence

@article{Chaiwongkhot2019EavesdroppersAT, title={Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence}, author={Poompong Chaiwongkhot and Katanya B. Kuntz and Yanbao Zhang and Anqi Huang and Jean-Philippe Bourgoin and Shihan Sajeed and Norbert Lutkenhaus and Thomas Jennewein and Vadim Makarov}, journal={Physical Review A}, year={2019} }

The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index of refraction. We experimentally investigate the impact turbulence has on Eve's attack on a free…

## 22 Citations

### Mitigating the effect of atmospheric turbulence on orbital angular momentum-based quantum key distribution using real-time adaptive optics with phase unwrapping.

- PhysicsOptics express
- 2021

This work investigates the performance degradation of OAM-based QKD by infinitely long phase screen (ILPS), which offers a feasible way to study how adaptive optics (AO) dynamically corrects the turbulence-induced aberrations in real time, and simulates that real-time AO can still mitigate the impact of atmospheric turbulence on O AM-basedQKD even in the large wind velocity regime.

### Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination.

- Computer ScienceOptics express
- 2020

It is experimentally demonstrated that, in the detector under test, the patch of photocurrent monitor against the detector blinding attack can be defeated by the pulse illumination attack proposed in this paper.

### Laser-Damage Attack Against Optical Attenuators in Quantum Key Distribution

- PhysicsPhysical Review Applied
- 2020

Many quantum key distribution systems employ a laser followed by an optical attenuator to prepare weak coherent states in the source. Their mean photon number must be pre-calibrated to guarantee the…

### Security proof of practical quantum key distribution with detection-efficiency mismatch

- Computer Science
- 2020

The method applies to a variety of coding mechanisms, including time-bin encoding, and also allows for general manipulations of the spatial-temporal modes by the adversary, which can close the long-standing question how to provide a valid, complete security proof of a QKD setup with characterized efficiency mismatch.

### Quantum key distribution over turbulent atmospheric channels

- Computer Science
- 2019

This study examines the HOM interference in a realistic lab environment and concludes that exceptional interference visibility can be achieved using typical commercially available optical devices and detectors, further demonstrating the applicability of the MDI-QKD protocol.

### Generalized efficiency mismatch attack to bypass the detection-scrambling countermeasure.

- Computer ScienceOptics express
- 2021

This work shows how randomization effectively prevents the initial attack but fails to do so when Eve generalizes her attack strategy, and could be used to scrutinize a free-space quantum communication receiver against detector-efficiency-mismatch type attacks.

### Integrating deep learning to achieve phase compensation for free-space orbital-angular-momentum-encoded quantum key distribution under atmospheric turbulence

- PhysicsPhotonics Research
- 2021

A high-dimensional quantum key distribution (QKD), which adopts degrees of freedom of the orbital angular momentum (OAM) states, is beneficial to realize secure and high-speed QKD. However, the…

### Spooky Action at a Global Distance $-$ Resource-Rate Analysis of a Space-Based Entanglement-Distribution Network for the Quantum Internet

- Physics
- 2019

This work proposes a global-scale quantum internet consisting of a constellation of orbiting satellites that provides a continuous on-demand entanglement distribution service to ground stations and determines the optimal resource cost of such a network for obtaining continuous global coverage.

### Statistical Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange Protocol

- Computer Science, MathematicsArXiv
- 2021

This paper introduces and demonstrates four new statistical attacks against the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchange scheme and explores the bilateral situation where Eve has partial knowledge of Alice’s and Bob’'s RNGs.

### Deterministic Random Number Generator Attack against the Kirchhoff-Law-Johnson-Noise Secure Key Exchange Protocol

- Computer ScienceFluctuation and Noise Letters
- 2021

The vulnerability of the Kirchhoff-Law-Johnson-Noise (KLJN) secure key exchanger to compromised random number generator(s) even if these random numbers are used solely to generate the noises emulating the Johnson noise of Alice's and Bob’s resistors is demonstrated.

## References

SHOWING 1-10 OF 68 REFERENCES

### Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

- Computer Science, Physics
- 2001

It is concluded that additional protection is necessary for currently implemented quantum key distribution systems against the large pulse attack, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states.

### Studying free-space transmission statistics and improving free-space quantum key distribution in the turbulent atmosphere

- Physics
- 2012

The statistical fluctuations in free-space links in the turbulent atmosphere are important for the distribution of quantum signals. To that end, we first study statistics generated by the turbulent…

### Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

- Physics
- 2015

In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control…

### Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

- Computer Science, Physics
- 2011

A very simple but highly effective attack that does not need to intercept the quantum channel at all and an even simpler and more effective countermeasure is found to inhibit this and similar attacks.

### Experimental quantum key distribution with simulated ground-to-satellite photon losses and processing limitations

- Physics, Computer Science
- 2015

The feasibility of a trusted quantum receiver on an orbiting satellite using a QKD protocol, with optical transmission and full post-processing, in the high-loss regime using minimized computing hardware at the receiver is demonstrated.

### Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

- Computer Science
- 2010

This paper performs a proof-of-principle experiment to demonstrate a technically feasible 'intercept- and-resend' attack that exploits such a security loophole in a commercial 'plug & play' QKD system.

### Effects of detector efficiency mismatch on security of quantum cryptosystems

- Physics, Computer Science
- 2006

For the Bennett-Brassard 1984 (BB84) protocol, it is shown that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough, Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%.

### Entangled quantum key distribution over two free-space optical links.

- PhysicsOptics express
- 2008

This work reports on the first real-time implementation of a quantum key distribution (QKD) system using entangled photon pairs that are sent over two free-space optical telescope links using a type-II spontaneous parametric down-conversion source placed in a central, potentially untrusted, location.

### Time-shift attack in practical quantum cryptosystems

- Computer ScienceQuantum Inf. Comput.
- 2007

This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure.

### A comprehensive design and performance analysis of low Earth orbit satellite quantum communication

- Physics
- 2013

Optical quantum communication utilizing satellite platforms has the potential to extend the reach of quantum key distribution (QKD) from terrestrial limits of ∼200 km to global scales. We have…