# Experimental demonstration of time-shift attack against practical quantum key distribution systems

@article{Zhao2007ExperimentalDO, title={Experimental demonstration of time-shift attack against practical quantum key distribution systems}, author={Yi Zhao and Chi-Hang Fred Fung and Bing Qi and Christine Chen and Hoi-Kwong Lo}, journal={Physical Review A}, year={2007} }

Quantum-key-distribution (QKD) systems can send quantum signals over more than $100\phantom{\rule{0.3em}{0ex}}\mathrm{km}$ standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack\char22{}namely, the time-shift attack\char22{}against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability $(\ensuremath{\sim}4%)$ to break the security of the system. Eve's…

## 354 Citations

Quantum hacking: attacking practical quantum key distribution systems

- Physics, EngineeringSPIE Optical Engineering + Applications
- 2007

Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections…

Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

- Physics
- 2010

Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections…

Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

- Computer Science, Physics
- 2018

A security loophole at the transmitter of the GHz-clock QKD is pointed out, revealing that the limited bandwidth of the ultrafast optical transmitter’s electronics generates deviations from the ideal signal, and a countermeasure is developed which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission.

Security of practical quantum key distribution with weak-randomness basis selection

- Physics
- 2020

The security of the perfect quantum key distribution protocol can be guaranteed by applying the fundamental laws of quantum mechanics, but the practical quantum key distribution system may be…

Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.

- Computer Science, PhysicsPhysical review letters
- 2013

The first proof-of-principle implementation of a new quantum-key-distribution protocol that is immune to any such attack is reported, and the feasibility of controlled two-photon interference in a real-world environment is established.

Attacking a Measurement Device Independent Practical Quantum-Key-Distribution System with Wavelength-Dependent Beam-Splitter and Multi-Wavelength Sources

- Engineering
- 2014

It is known that practical quantum key distribution system, because of the imperfect of devices, has sort of loopholes, so Eve can attack through these loopholes. The proposition of measurement…

Finite-key analysis for measurement-device-independent quantum key distribution.

- Computer Science, PhysicsNature communications
- 2014

This work provides a rigorous security proof against general attacks in the finite-key regime by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation and demonstrates the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system

- Computer Science2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
- 2011

This work states that Eve, the would-be eavesdropper, could exploit imperfections in Alice's or Bob's equipment remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol.

Improve security of quantum cryptography

- Physics
- 2007

Quantum key distribution (QKD) is a method to establish a secret key between two communicating parties, often referred to as Alice and Bob. Should an eavesdropper, Eve, spy on their communication,…

Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

- Computer Science
- 2014

The recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally is reviewed and recent hacking works in details are presented, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack.

## References

SHOWING 1-10 OF 14 REFERENCES

"J."

- 1890

however (for it was the literal soul of the life of the Redeemer, John xv. io), is the peculiar token of fellowship with the Redeemer. That love to God (what is meant here is not God’s love to men)…

European Physical Journal D 41

- 599
- 2007

European Physical Journal D 41

- 599
- 2007

Nature 447

- 372
- 2007

Conf

- Ser. 36, 98
- 2006

Phys

- Rev. A 74, 022313
- 2006

Phys

- Rev. Lett. 95, 010503
- 2005

Phys

- Rev. Lett. 91, 057901 (2003); H.-K. Lo, X. Ma, and K. Chen, Phys. Rev. Lett. 94, 230504 (2005); X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005); X. Ma, et al., Phys. Rev. A 72, 012326 (2005); X.-B. Wang, Phys. Rev. A 72, 012322
- 2005

Quant

- Info. Compu. 5, 413
- 2005

in Theory of Cryptography: Second Theory of Cryptography Conference

- TCC 2005, Lecture Notes in Computer Science, edited by J. Kilian
- 2005