Experimental demonstration of time-shift attack against practical quantum key distribution systems

@article{Zhao2007ExperimentalDO,
  title={Experimental demonstration of time-shift attack against practical quantum key distribution systems},
  author={Yi Zhao and Chi-Hang Fred Fung and Bing Qi and Christine Chen and Hoi-Kwong Lo},
  journal={Physical Review A},
  year={2007}
}
  • Yi Zhao, C. Fung, +2 authors H. Lo
  • Published 24 April 2007
  • Physics, Computer Science
  • Physical Review A
Quantum-key-distribution (QKD) systems can send quantum signals over more than $100\phantom{\rule{0.3em}{0ex}}\mathrm{km}$ standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack\char22{}namely, the time-shift attack\char22{}against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability $(\ensuremath{\sim}4%)$ to break the security of the system. Eve's… Expand
Quantum hacking: attacking practical quantum key distribution systems
  • B. Qi, C. Fung, +4 authors H. Lo
  • Physics, Engineering
  • SPIE Optical Engineering + Applications
  • 2007
Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfectionsExpand
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfectionsExpand
Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses
TLDR
A security loophole at the transmitter of the GHz-clock QKD is pointed out, revealing that the limited bandwidth of the ultrafast optical transmitter’s electronics generates deviations from the ideal signal, and a countermeasure is developed which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Expand
Security of practical quantum key distribution with weak-randomness basis selection
The security of the perfect quantum key distribution protocol can be guaranteed by applying the fundamental laws of quantum mechanics, but the practical quantum key distribution system may beExpand
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.
TLDR
The first proof-of-principle implementation of a new quantum-key-distribution protocol that is immune to any such attack is reported, and the feasibility of controlled two-photon interference in a real-world environment is established. Expand
Attacking a Measurement Device Independent Practical Quantum-Key-Distribution System with Wavelength-Dependent Beam-Splitter and Multi-Wavelength Sources
It is known that practical quantum key distribution system, because of the imperfect of devices, has sort of loopholes, so Eve can attack through these loopholes. The proposition of measurementExpand
Finite-key analysis for measurement-device-independent quantum key distribution.
TLDR
This work provides a rigorous security proof against general attacks in the finite-key regime by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation and demonstrates the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission. Expand
Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system
  • N. Jain, L. Lydersen, +5 authors G. Leuchs
  • Computer Science
  • 2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
  • 2011
TLDR
This work states that Eve, the would-be eavesdropper, could exploit imperfections in Alice's or Bob's equipment remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol. Expand
Improve security of quantum cryptography
Quantum key distribution (QKD) is a method to establish a secret key between two communicating parties, often referred to as Alice and Bob. Should an eavesdropper, Eve, spy on their communication,Expand
Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices
TLDR
The recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally is reviewed and recent hacking works in details are presented, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 14 REFERENCES
"J."
however (for it was the literal soul of the life of the Redeemer, John xv. io), is the peculiar token of fellowship with the Redeemer. That love to God (what is meant here is not God’s love to men)Expand
European Physical Journal D 41
  • 599
  • 2007
European Physical Journal D 41
  • 599
  • 2007
Nature 447
  • 372
  • 2007
Conf
  • Ser. 36, 98
  • 2006
Phys
  • Rev. A 74, 022313
  • 2006
Phys
  • Rev. Lett. 95, 010503
  • 2005
Phys
  • Rev. Lett. 91, 057901 (2003); H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005); X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005); X. Ma, et al., Phys. Rev. A 72, 012326 (2005); X.-B. Wang, Phys. Rev. A 72, 012322
  • 2005
Quant
  • Info. Compu. 5, 413
  • 2005
in Theory of Cryptography: Second Theory of Cryptography Conference
  • TCC 2005, Lecture Notes in Computer Science, edited by J. Kilian
  • 2005
...
1
2
...