Experimental Side Channel Analysis of BB84 QKD Source

@article{Biswas2021ExperimentalSC,
  title={Experimental Side Channel Analysis of BB84 QKD Source},
  author={Ayan Kumar Biswas and Anindya Banerji and Pooja Chandravanshi and Rupesh Kumar and Ravindra Pratap Singh},
  journal={IEEE Journal of Quantum Electronics},
  year={2021},
  volume={57},
  pages={1-7}
}
A typical implementation of BB84 protocol for quantum communication uses four laser diodes for transmitting weak coherent pulses, which may not have the same characteristics. We have characterized these lasers for mismatch in various parameters such as spectral width, pulse width, spatial mode, peak wavelength, polarization and their arrival times at the receiver. This information is utilized to calculate possible information leakage through side channel attacks by evaluating mutual information… 

Figures from this paper

Practical Side-Channel Attack on Free-Space QKD Systems With Misaligned Sources and Countermeasures

This work characterize, and experimentally verify, a side-channel attack on spatially distinguishable states against free-space QKD systems with misaligned laser sources, and proposes two countermeasures to eliminate the spatial distinguishability and secure the key exchange.

Particles Detector as Random Numbers Generator at the Internet of Space Things Based at the BB84 Protocol

  • H. Nieto-Chaupis
  • Physics
    2022 International Conference on Electrical, Computer and Energy Technologies (ICECET)
  • 2022
This paper presents a proposal based at the conjunction of Internet of Space Things and quantum mechanics in order to establish a secure mechanism of inter-satellite communication. For this end the

Cryptographic security concerns on timestamp sharing via a public channel in quantum-key-distribution systems

It is demonstrated that increasing the bin width does not monotonically reduce the mutual information between the key bits and the eavesdropper’s observation of detector responses, and the start time of binning is shown to be important in binning process and the Mutual informationuctuates periodically with respect to it.

References

SHOWING 1-10 OF 40 REFERENCES

Critical side channel effects in random bit generation with multiple semiconductor lasers in a polarization-based quantum key distribution system.

Experimental results show unnoticed side channels of temporal disparity and intensity fluctuation, which possibly exist in the operation of multiple semiconductor laser diodes, which can enormously degrade security performance of QKD systems.

Information leakage via side channels in freespace BB84 quantum cryptography

Measurements of all degrees of freedom of the transmitted photons are reported on in order to estimate potential side channels of the state preparation at Alice in a free space BB84 transmitter operating with polarization encoded attenuated pulses.

Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems

This work presents a risk analysis of Trojan-horse attacks on quantum key distribution systems based on extensive spectral measurements, and indicates the existence of wavelength regimes, where the attacker gains considerable advantage as compared to launching an attack at 1550 nm.

Measurement-device-independent quantum key distribution.

The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.

The security of practical quantum key distribution

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber.

This record-breaking implementation of the MDIQKD method provides a new distance record and achieves a distance that the traditional Bennett-Brassard 1984 QKD would not be able to achieve with the same detection devices even with ideal single-photon sources.

Security of quantum key distribution with imperfect devices

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof

Breaking a quantum key distribution system through a timing side channel.

It is experimentally demonstrated how, in some implementations, timing information revealed during public discussion between the communicating parties can be used by an eavesdropper to undetectably access a significant portion of the "secret" key.

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.

Experimental Quantum Cryptography

An apparatus and protocol designed to implement quantum key distribution is described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.