# Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

@article{Vakhitov2001LargePA, title={Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography}, author={Artem Vakhitov and Vadim Makarov and Dag Roar Hjelme}, journal={Journal of Modern Optics}, year={2001}, volume={48}, pages={2023 - 2038} }

Abstract In this paper so-called ‘large pulse attack’ is investigated. This attack is one of the possible methods of conventional optical eavesdropping, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states. It allows the eavesdropper to avoid inducing transmission errors that disclose her presence to the legal users. As an object of the eavesdropping, phase-state fibre optic schemes are considered. With…

## 127 Citations

### Energy Conservation in Distributed Interference as a Guarantee for Detecting a Detector Blinding Attack in Quantum Cryptography

- Computer Science, PhysicsJournal of Experimental and Theoretical Physics
- 2019

An avalanche single-photon detector blinding attack is one of the methods for quantum hacking of quantum key distribution (QKD) systems and changes the photocount statistics and leads to the detection of an eavesdropper.

### On the structural stability of phase-coded quantum cryptography against detector-blinding attacks

- Computer ScienceLaser Physics Letters
- 2021

The paper proposes a fundamentally new method of detecting and protecting quantum cryptography systems with phase coding against the attack with avalanche detector blinding, based on diverting a part of the input signal in the receiving terminal to bypass the interferometer and deliver it to the same avalanche detectors.

### Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography

- Computer Science
- 2020

The decoy state method is generalized with regard to active probing attacks, and boundaries for state parameters in side communication channels are obtained that guarantee secret key distribution for a given length of the communication channel.

### Inherent security of phase coding quantum key distribution systems against detector blinding attacks

- Computer Science, Physics
- 2018

It is proved that detector blinding attack, when acts on QKD systems with phase coding, leads to a distortion of the photocounts statistics so the eavesdropper may always be detected.

### Effects of detector efficiency mismatch on security of quantum cryptosystems

- Physics, Computer Science
- 2006

For the Bennett-Brassard 1984 (BB84) protocol, it is shown that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough, Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%.

### Response to Comment on ‘Inherent security of phase coding quantum key distribution systems against detector blinding attacks’

- Computer Science, PhysicsLaser Physics Letters
- 2018

It is proved that detector blinding attack, when acts on QKD systems with phase coding, leads to a distortion of the photocounts statistics so the eavesdropper may always be detected.

### Time-shift attack in practical quantum cryptosystems

- Computer ScienceQuantum Inf. Comput.
- 2007

This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure.

### Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems

- Computer Science, PhysicsIEEE Journal of Selected Topics in Quantum Electronics
- 2015

This work presents a risk analysis of Trojan-horse attacks on quantum key distribution systems based on extensive spectral measurements, and indicates the existence of wavelength regimes, where the attacker gains considerable advantage as compared to launching an attack at 1550 nm.

### Trojan-horse attacks threaten the security of practical quantum cryptography

- Computer Science, Physics
- 2014

Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards, and countermeasures to prevent such attacks are proposed.

### Long-distance quantum key distribution secure against coherent attacks

- Computer Science
- 2017

The security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys is explored, and it is demonstrated that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexed of conventional signals, and up to 200 km with multiplexing.

## References

SHOWING 1-10 OF 41 REFERENCES

### Information Gain in Quantum Eavesdropping

- Computer Science
- 1994

This work provides an upper and a lower limit on the amount of information that may have leaked to the eavesdropper at the end of the key distribution procedure, which is higher than has been estimated so far.

### An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light

- PhysicsIEEE Journal of Quantum Electronics
- 2000

We have developed a system for quantum key distribution (QKD), based on standard telecommunication lasers, detectors, and optical fiber, that passively compensates for time-dependent variations of…

### Quantum cryptography using any two nonorthogonal states.

- PhysicsPhysical review letters
- 1992

It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.

### Long-distance entanglement-based quantum key distribution

- Physics
- 2000

A detailed analysis of quantum key distribution employing entangled states is presented. We tested a system based on photon pairs entangled in energy-time optimized for long-distance transmission. It…

### Security of Quantum Cryptography against Collective Attacks

- Computer Science, Mathematics
- 1997

Strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key are presented and security against any attack allowed by the rules of quantum mechanics is discussed.

### Security against eavesdropping in quantum cryptography.

- Computer Science, PhysicsPhysical review. A, Atomic, molecular, and optical physics
- 1996

A sharp estimate is given for the amount of Shannon information and expected collision probability for all eavesdropping strategies described by a generalized measurement and restricted to the Hilbert space of the one-photon state.

### Quantum amplifiers, quantum duplicators and quantum cryptography

- Physics
- 1996

Several methods for eavesdropping on the standard four coherent-state quantum cryptosystem together with a possible countermeasure are analysed and found to place a limit on the tolerable energy…

### Quantum key distribution over distances as long as 30 km.

- Computer Science, MathematicsOptics letters
- 1995

Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols.

### Quantum-state disturbance versus information gain: Uncertainty relations for quantum information.

- MathematicsPhysical review. A, Atomic, molecular, and optical physics
- 1996

The trade-off between the information gain and that disturbance in the act of observation is investigated, and the optimal detection method is explicitly found in the case of two equiprobable nonorthogonal pure states.

### Quantum cryptography in free space.

- Physics, Computer ScienceOptics letters
- 1996

A fully operational system based on the transmission of single photons in free space under daylight conditions has been demonstrated and the feasibility of a global system for quantum cryptography based on a network of ground stations and satellites is discussed.