# Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

@article{Vakhitov2001LargePA, title={Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography}, author={Artem Vakhitov and Vadim Makarov and Dag Roar Hjelme}, journal={Journal of Modern Optics}, year={2001}, volume={48}, pages={2023 - 2038} }

Abstract In this paper so-called ‘large pulse attack’ is investigated. This attack is one of the possible methods of conventional optical eavesdropping, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states. It allows the eavesdropper to avoid inducing transmission errors that disclose her presence to the legal users. As an object of the eavesdropping, phase-state fibre optic schemes are considered. With… Expand

#### Topics from this paper

#### 117 Citations

Energy Conservation in Distributed Interference as a Guarantee for Detecting a Detector Blinding Attack in Quantum Cryptography

- Computer Science
- Journal of Experimental and Theoretical Physics
- 2019

An avalanche single-photon detector blinding attack is one of the methods for quantum hacking of quantum key distribution (QKD) systems and changes the photocount statistics and leads to the detection of an eavesdropper. Expand

On the structural stability of phase-coded quantum cryptography against detector-blinding attacks

- Physics
- Laser Physics Letters
- 2021

Quantum key distribution (QKD) systems are open systems. Thus, an eavesdropper can actively influence the elements of the system through the communication line, altering their regular operation. One… Expand

Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography

- Computer Science
- 2020

The decoy state method is generalized with regard to active probing attacks, and boundaries for state parameters in side communication channels are obtained that guarantee secret key distribution for a given length of the communication channel. Expand

Inherent security of phase coding quantum key distribution systems against detector blinding attacks

- Computer Science
- Laser Physics Letters
- 2018

It is proved that detector blinding attack, when acts on QKD systems with phase coding, leads to a distortion of the photocounts statistics so the eavesdropper may always be detected. Expand

Effects of detector efficiency mismatch on security of quantum cryptosystems

- Physics
- 2006

We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon… Expand

Time-shift attack in practical quantum cryptosystems

- Computer Science, Physics
- Quantum Inf. Comput.
- 2007

This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure. Expand

Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems

- Physics
- IEEE Journal of Selected Topics in Quantum Electronics
- 2015

An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horse… Expand

Trojan-horse attacks threaten the security of practical quantum cryptography

- Computer Science, Physics
- 2014

Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards, and countermeasures to prevent such attacks are proposed. Expand

Long-distance quantum key distribution secure against coherent attacks

- Computer Science, Physics
- 2017

The security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys is explored, and it is demonstrated that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexed of conventional signals, and up to 200 km with multiplexing. Expand

Detection Efficiency Mismatch and Finite-Key-Size Attacks on Practical Quantum Cryptography Systems

- Computer Science
- 2016

This thesis presents three experimental studies of attacks on quantum key distribution (QKD) systems, including a demonstration of Eve’s ability to force a commercial system to distill a key from a raw key of a short length, where the asymptotic assumption of security claimed by the manufacturer might not hold. Expand

#### References

SHOWING 1-10 OF 41 REFERENCES

Information Gain in Quantum Eavesdropping

- Computer Science
- 1994

This work provides an upper and a lower limit on the amount of information that may have leaked to the eavesdropper at the end of the key distribution procedure, which is higher than has been estimated so far. Expand

An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light

- Physics
- IEEE Journal of Quantum Electronics
- 2000

We have developed a system for quantum key distribution (QKD), based on standard telecommunication lasers, detectors, and optical fiber, that passively compensates for time-dependent variations of… Expand

Quantum cryptography using any two nonorthogonal states.

- Computer Science, Medicine
- Physical review letters
- 1992

It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described. Expand

Long-distance entanglement-based quantum key distribution

- Physics
- 2000

A detailed analysis of quantum key distribution employing entangled states is presented. We tested a system based on photon pairs entangled in energy-time optimized for long-distance transmission. It… Expand

Security of Quantum Cryptography against Collective Attacks

- Physics
- 1997

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which… Expand

Security against eavesdropping in quantum cryptography.

- Physics, Medicine
- Physical review. A, Atomic, molecular, and optical physics
- 1996

A sharp estimate is given for the amount of Shannon information and expected collision probability for all eavesdropping strategies described by a generalized measurement and restricted to the Hilbert space of the one-photon state. Expand

Quantum amplifiers, quantum duplicators and quantum cryptography

- Physics
- 1996

Several methods for eavesdropping on the standard four coherent-state quantum cryptosystem together with a possible countermeasure are analysed and found to place a limit on the tolerable energy… Expand

Quantum key distribution over distances as long as 30 km.

- Physics, Medicine
- Optics letters
- 1995

Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols. Expand

Generalized privacy amplification

- Computer Science
- IEEE Trans. Inf. Theory
- 1995

This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity. Expand

Quantum-state disturbance versus information gain: Uncertainty relations for quantum information.

- Physics, Medicine
- Physical review. A, Atomic, molecular, and optical physics
- 1996

The trade-off between the information gain and that disturbance in the act of observation is investigated, and the optimal detection method is explicitly found in the case of two equiprobable nonorthogonal pure states. Expand