1,334
Views
57
CrossRef citations to date
0
Altmetric
Articles

Attacks on practical quantum key distribution systems (and how to prevent them)

, , , , &
Pages 366-387 | Received 25 Dec 2015, Accepted 27 Jan 2016, Published online: 09 Mar 2016
 

Abstract

With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory–practice deviations can open loopholes and compromise security. Several such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarising a variety of attacks and their prevention mechanisms.

Acknowledgements

We thank Kevin Günthner for proofreading the manuscript.

Notes

No potential conflict of interest was reported by the authors.

1 In fact, the proof for non-existence of such methods is related to one of the famous millennium problems.

2 A train of narrow voltage pulses applied on the diode so that it switches between the linear mode and Geiger mode are called gates. Refer Section 3.1.2 and Figure for details on these modes.

3 The expected behaviour scales as 1-exp[-μ·η(t)] with the mean photon number μ of a coherent state used for faking the detection outcomes; η(t) is the single photon detection efficiency as a function of time. Since η(t)<<1 at the falling edge of the gate, 1-exp[-μ·η(t)]μ·η(t). In other words, the expected behaviour must be nearly linear. The measured behaviour of the detection probabilities is however always above this linear curve, therefore the term superlinear.

4 To understand the concept of discernability in a simple way, one should be able to, for instance, simply exchange D0 and D1 without hindering or altering the operation of the QKD system. Of course, the key obtained by Bob would then be uniformly opposite to that of Alice but a simple NOT operation would suffice to reconcile their keys.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 775.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.