Faked states attack on quantum cryptosystems

@article{Makarov2005FakedSA,
  title={Faked states attack on quantum cryptosystems},
  author={Vadim Makarov * and Dag Roar Hjelme},
  journal={Journal of Modern Optics},
  year={2005},
  volume={52},
  pages={691 - 705}
}
A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Applying this attack to systems with passive basis choice on Bob's side is considered. Also, a general workflow of breaking into a running quantum cryptolink using this or Trojan horse… 

Faked states attack and quantum cryptography protocols

This paper examines the Kak quantum cryptography protocol and how it may perform under attacks and exploits a weakness in the typical real-world implementation of quantum cryptosystems.

A Taxonomy of Attacks on Quantum Key Distribution

This paper classifies the already known attacks strategies and shows how these attacks may compromise the security QKD, while utilizing it as part of secure communication scheme in practice.

Secure quantum key distribution with realistic devices

This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment.

Security Analysis of Quantum Cryptographic Protocols

In this chapter, we review the principle of some common quantum attacks, such as intercept-and-resend attack, teleportation attack, man-in-the-middle attack, participant attack, and implementation

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

Time-shift attack in practical quantum cryptosystems

This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure.

Four Phase States Eavesdropping with no Quantum Interaction

The Trojan horse attack is experimentally demonstrated, which is one of the possible methods of conventional optical eavesdropping that eliminates the need of immediate interaction with transmitted quantum states.

After-gate attack on a quantum cryptosystem

A method to control the detection events in quantum key distribution systems that use gated single-photon detectors that employs bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time to allow for an intercept–resend attack.

Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system

  • N. JainL. Lydersen G. Leuchs
  • Computer Science
    2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
  • 2011
This work states that Eve, the would-be eavesdropper, could exploit imperfections in Alice's or Bob's equipment remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol.
...

References

SHOWING 1-10 OF 23 REFERENCES

ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY

A protocol for quantum cryptography which is secure against attacks on individual signals based on the Bennett-Brassard protocol of 1984, which gives the probability of a successful key generation and the probability for an eavesdropper's knowledge to be below a specified maximal value.

A practical trojan horse for bell-inequality-based quantum cryptography

The old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device, even when you do violate the Bell inequality.

Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

It is concluded that additional protection is necessary for currently implemented quantum key distribution systems against the large pulse attack, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states.

Long-distance entanglement-based quantum key distribution

A detailed analysis of quantum key distribution employing entangled states is presented. We tested a system based on photon pairs entangled in energy-time optimized for long-distance transmission. It

Quantum cryptography

The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.

The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks?

Abstract Silicon avalanche photodiodes are the most sensitive photodetectors in the visible to near-infrared region for a wavelength <1000 nm. However, when they are used for single photon detection

The Code Book

The Coder should refer to the publicly available copy of the award at (or available in hard copy in Professor Franck’s library), and write manuscript notes on their copies of the Chart identifying the relevant, omitted information and its location within the award.

Faked states attack on quantum cryptosystems

    quant-ph/9907006. The optical quantum random number generator described in the above paper is commercially available from id Quantique, http://www.idquantique.com/ See also more recent

    • quant-ph/9907006. The optical quantum random number generator described in the above paper is commercially available from id Quantique, http://www.idquantique.com/ See also more recent
    • 1999

    quant-ph/9907006

    • The optical quantum random number generator described in the above paper is commercially available from id Quantique, http://www.idquantique.com/ See also more recent (introduced in March 2004) Quantis quantum random number generator
    • 1999