Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

@article{Vakhitov2001LargePA,
  title={Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography},
  author={Artem Vakhitov and Vadim Makarov and Dag Roar Hjelme},
  journal={Journal of Modern Optics},
  year={2001},
  volume={48},
  pages={2023 - 2038}
}
Abstract In this paper so-called ‘large pulse attack’ is investigated. This attack is one of the possible methods of conventional optical eavesdropping, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states. It allows the eavesdropper to avoid inducing transmission errors that disclose her presence to the legal users. As an object of the eavesdropping, phase-state fibre optic schemes are considered. With… Expand
Energy Conservation in Distributed Interference as a Guarantee for Detecting a Detector Blinding Attack in Quantum Cryptography
  • S. N. Molotkov
  • Computer Science
  • Journal of Experimental and Theoretical Physics
  • 2019
TLDR
An avalanche single-photon detector blinding attack is one of the methods for quantum hacking of quantum key distribution (QKD) systems and changes the photocount statistics and leads to the detection of an eavesdropper. Expand
On the structural stability of phase-coded quantum cryptography against detector-blinding attacks
Quantum key distribution (QKD) systems are open systems. Thus, an eavesdropper can actively influence the elements of the system through the communication line, altering their regular operation. OneExpand
Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography
TLDR
The decoy state method is generalized with regard to active probing attacks, and boundaries for state parameters in side communication channels are obtained that guarantee secret key distribution for a given length of the communication channel. Expand
Inherent security of phase coding quantum key distribution systems against detector blinding attacks
TLDR
It is proved that detector blinding attack, when acts on QKD systems with phase coding, leads to a distortion of the photocounts statistics so the eavesdropper may always be detected. Expand
Effects of detector efficiency mismatch on security of quantum cryptosystems
We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photonExpand
Time-shift attack in practical quantum cryptosystems
TLDR
This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure. Expand
Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems
An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the back-reflected pulses. Such Trojan-horseExpand
Trojan-horse attacks threaten the security of practical quantum cryptography
TLDR
Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards, and countermeasures to prevent such attacks are proposed. Expand
Long-distance quantum key distribution secure against coherent attacks
TLDR
The security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys is explored, and it is demonstrated that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexed of conventional signals, and up to 200 km with multiplexing. Expand
Detection Efficiency Mismatch and Finite-Key-Size Attacks on Practical Quantum Cryptography Systems
TLDR
This thesis presents three experimental studies of attacks on quantum key distribution (QKD) systems, including a demonstration of Eve’s ability to force a commercial system to distill a key from a raw key of a short length, where the asymptotic assumption of security claimed by the manufacturer might not hold. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 41 REFERENCES
Information Gain in Quantum Eavesdropping
TLDR
This work provides an upper and a lower limit on the amount of information that may have leaked to the eavesdropper at the end of the key distribution procedure, which is higher than has been estimated so far. Expand
An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light
We have developed a system for quantum key distribution (QKD), based on standard telecommunication lasers, detectors, and optical fiber, that passively compensates for time-dependent variations ofExpand
Quantum cryptography using any two nonorthogonal states.
  • Bennett
  • Computer Science, Medicine
  • Physical review letters
  • 1992
TLDR
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described. Expand
Long-distance entanglement-based quantum key distribution
A detailed analysis of quantum key distribution employing entangled states is presented. We tested a system based on photon pairs entangled in energy-time optimized for long-distance transmission. ItExpand
Security of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for whichExpand
Security against eavesdropping in quantum cryptography.
  • Lütkenhaus
  • Physics, Medicine
  • Physical review. A, Atomic, molecular, and optical physics
  • 1996
TLDR
A sharp estimate is given for the amount of Shannon information and expected collision probability for all eavesdropping strategies described by a generalized measurement and restricted to the Hilbert space of the one-photon state. Expand
Quantum amplifiers, quantum duplicators and quantum cryptography
Several methods for eavesdropping on the standard four coherent-state quantum cryptosystem together with a possible countermeasure are analysed and found to place a limit on the tolerable energyExpand
Quantum key distribution over distances as long as 30 km.
TLDR
Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols. Expand
Generalized privacy amplification
TLDR
This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity. Expand
Quantum-state disturbance versus information gain: Uncertainty relations for quantum information.
  • Fuchs, Pérès
  • Physics, Medicine
  • Physical review. A, Atomic, molecular, and optical physics
  • 1996
TLDR
The trade-off between the information gain and that disturbance in the act of observation is investigated, and the optimal detection method is explicitly found in the case of two equiprobable nonorthogonal pure states. Expand
...
1
2
3
4
5
...