# Faked states attack on quantum cryptosystems

@article{Makarov2005FakedSA, title={Faked states attack on quantum cryptosystems}, author={Vadim Makarov * and Dag Roar Hjelme}, journal={Journal of Modern Optics}, year={2005}, volume={52}, pages={691 - 705} }

A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Applying this attack to systems with passive basis choice on Bob's side is considered. Also, a general workflow of breaking into a running quantum cryptolink using this or Trojan horse…

## 157 Citations

### Faked states attack and quantum cryptography protocols

- Computer Science, MathematicsArXiv
- 2011

This paper examines the Kak quantum cryptography protocol and how it may perform under attacks and exploits a weakness in the typical real-world implementation of quantum cryptosystems.

### A Taxonomy of Attacks on Quantum Key Distribution

- Computer Science, Mathematics
- 2011

This paper classifies the already known attacks strategies and shows how these attacks may compromise the security QKD, while utilizing it as part of secure communication scheme in practice.

### Secure quantum key distribution with realistic devices

- Computer Science, Physics
- 2020

This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.

### Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Computer Science, PhysicsTPNC
- 2012

The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment.

### Security Analysis of Quantum Cryptographic Protocols

- Computer Science, Mathematics
- 2020

In this chapter, we review the principle of some common quantum attacks, such as intercept-and-resend attack, teleportation attack, man-in-the-middle attack, participant attack, and implementation…

### Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, MathematicsNature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

### Time-shift attack in practical quantum cryptosystems

- Computer ScienceQuantum Inf. Comput.
- 2007

This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure.

### Four Phase States Eavesdropping with no Quantum Interaction

- Physics, Computer Science2008 6th National Conference on Telecommunication Technologies and 2008 2nd Malaysia Conference on Photonics
- 2008

The Trojan horse attack is experimentally demonstrated, which is one of the possible methods of conventional optical eavesdropping that eliminates the need of immediate interaction with transmitted quantum states.

### After-gate attack on a quantum cryptosystem

- Physics, Computer Science
- 2010

A method to control the detection events in quantum key distribution systems that use gated single-photon detectors that employs bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time to allow for an intercept–resend attack.

### Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system

- Computer Science2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
- 2011

This work states that Eve, the would-be eavesdropper, could exploit imperfections in Alice's or Bob's equipment remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol.

## References

SHOWING 1-10 OF 23 REFERENCES

### ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY

- Computer Science, Mathematics
- 1999

A protocol for quantum cryptography which is secure against attacks on individual signals based on the Bennett-Brassard protocol of 1984, which gives the probability of a successful key generation and the probability for an eavesdropper's knowledge to be below a specified maximal value.

### A practical trojan horse for bell-inequality-based quantum cryptography

- Computer Science, PhysicsQuantum Inf. Comput.
- 2002

The old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device, even when you do violate the Bell inequality.

### Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

- Computer Science, Physics
- 2001

It is concluded that additional protection is necessary for currently implemented quantum key distribution systems against the large pulse attack, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states.

### Long-distance entanglement-based quantum key distribution

- Physics
- 2000

A detailed analysis of quantum key distribution employing entangled states is presented. We tested a system based on photon pairs entangled in energy-time optimized for long-distance transmission. It…

### Quantum cryptography

- Computer Science
- 1996

The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.

### The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks?

- Physics
- 2001

Abstract Silicon avalanche photodiodes are the most sensitive photodetectors in the visible to near-infrared region for a wavelength <1000 nm. However, when they are used for single photon detection…

### The Code Book

- Medicine
- 1999

The Coder should refer to the publicly available copy of the award at (or available in hard copy in Professor Franck’s library), and write manuscript notes on their copies of the Chart identifying the relevant, omitted information and its location within the award.

### Faked states attack on quantum cryptosystems

### quant-ph/9907006. The optical quantum random number generator described in the above paper is commercially available from id Quantique, http://www.idquantique.com/ See also more recent

- quant-ph/9907006. The optical quantum random number generator described in the above paper is commercially available from id Quantique, http://www.idquantique.com/ See also more recent
- 1999

### quant-ph/9907006

- The optical quantum random number generator described in the above paper is commercially available from id Quantique, http://www.idquantique.com/ See also more recent (introduced in March 2004) Quantis quantum random number generator
- 1999