Hacking commercial quantum cryptography systems by tailored bright illumination

@article{Lydersen2010HackingCQ,
  title={Hacking commercial quantum cryptography systems by tailored bright illumination},
  author={Lars Lydersen and Carlos Wiechers and Christoffer Wittmann and Dominique Elser and Johannes Skaar and Vadim Makarov},
  journal={Nature Photonics},
  year={2010},
  volume={4},
  pages={686-689}
}
By using bright pulses of light to ‘blind’ the avalanche photodiode detectors used in quantum cryptography equipment, scientists in Europe have shown that it is possible to tracelessly steal the secret encryption key generated by such systems and thus compromise their security. 

Figures from this paper

Quantum key distribution without detector vulnerabilities using optically seeded lasers
Quantum cryptography immune from detector attacks is realized by the development of a source of indistinguishable laser pulses based on optically seeded gain-switched lasers. Key rates exceeding 1 MbExpand
Quantum cryptography: Continuous improvement
Using photons to disseminate encryption codes with complete security is one of the great successes of quantum information science. It has now been shown that long-distance cryptographic communicationExpand
Fortifying single photon detectors to quantum hacking attacks by using wavelength upconversion
  • G. Kanter
  • Physics
  • 2015 Conference on Lasers and Electro-Optics (CLEO)
  • 2015
Upconversion detection can isolate the temporal and wavelength window over which light can be efficiency received. Using appropriate designs the ability of an eavesdropper to damage, measure, orExpand
Intensity and State Estimation in Quantum Cryptography
This paper describes how the communicating parties can employ intensity and state estimation to detect if the eavesdropper has siphoned off and injected photons in the received communication. This isExpand
Analysis of information protection methods in the system telecommunications based on quantum cryptography
  • B. Ibrahimov, Mirfatma Javadova
  • Computer Science
  • İnformasiya təhlükəsizliyinin aktual multidissiplinar elmi-praktiki problemləri IV respublika konfransının materialları
  • 2018
TLDR
The system key distribution and protocols in the system quantum cryptography are considered and the methods, algorithms and principles operation of quantum cryptography to protect information from unauthorized access to a telecommunications system using fiber-optic communication lines are partially analyzed. Expand
A quantum hacking method without Eve’s detection and generation device
We develop quantum hacking method without requires complex devices including cost high and has moderate quantum efficiency. Using the proposed quantum hacking method, we confirm that Eve can acquireExpand
Quantum Erasure Cryptography
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose a protocol for quantum key distribution (QKD) based onExpand
Viewpoint: Foiling Quantum Hackers
Researchers have implemented a new quantum encryption method that, in principle, may provide the ultimate security against hackers in real-world cryptography applications.
Device-independent quantum key distribution
  • M. Curty
  • Physics
  • 2012 Conference on Lasers and Electro-Optics (CLEO)
  • 2012
Quantum hacking against commercial quantum key distribution (QKD) systems, particularly via detector side channel attacks, has emerged as a hot topic. We analyze two potential solutions to thisExpand
Timing attacks on practical quantum cryptographic systems
With photons being the only available candidates for long-distance quantum communication, most quantum cryptographic devices are physically realized as optical systems that operate a securityExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 32 REFERENCES
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
TLDR
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. Expand
Information leakage via side channels in freespace BB84 quantum cryptography
While the BB84 protocol is in principle secure, real implementations suffer from imperfections. Here, we analyse a free space BB84 transmitter, operating with polarization encoded attenuated pulses.Expand
Fast and simple one-way quantum key distribution
We present and demonstrate a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate. The key is obtained by aExpand
Breaking a quantum key distribution system through a timing side channel.
TLDR
It is experimentally demonstrated how, in some implementations, timing information revealed during public discussion between the communicating parties can be used by an eavesdropper to undetectably access a significant portion of the "secret" key. Expand
“Plug and play” systems for quantum cryptography
We present a time-multiplexed interferometer based on Faraday mirrors, and apply it to quantum key distribution. The interfering pulses follow exactly the same spatial path, ensuring very highExpand
Faked states attack on quantum cryptosystems
A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does notExpand
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proofExpand
Security of quantum key distribution with bit and basis dependent detector flaws
TLDR
Wesuggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob, in the presence of bit and basis dependent detector flaws. Expand
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
  • Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses). Expand
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key betweenExpand
...
1
2
3
4
...