Cryptographic security concerns on timestamp sharing via a public channel in quantum-key-distribution systems (original) (raw)
Related papers
Breaking a quantum key distribution system through a timing side channel References and links
The security of quantum key distribution relies on the validity of quantum mechanics as a description of nature and on the non-existence of leaky degrees of freedom in the practical implementations. We experimentally demonstrate how, in some implementations, timing information revealed during public discussion between the communicating parties can be used by an eavesdropper to undetectably access a significant portion of the "secret" key.
Time-shift attack in practical quantum cryptosystems
Quantum Information and Computation, 2007
Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another ``time-shift'' attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0'' and bit "1'' with the same SPD, Eve, in some circumstances, could acquire full information on the final key without introducing any error. In addition, we prove that if Alice and Bob are unaware of our attack, the final key they share is insecure. We emphasize that our attack is simple and feasible with current technology. Finally, we discuss some counter measures against our and earlier attacks.
Provably secure and high-rate quantum key distribution with time-bin qudits
Science advances, 2017
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of...
A Prospective Study of Information -Theoretic and Practical Quantum Key Distribution
Most modern cryptographic mechanisms are often based on the key distribution schemes, the security of which depends on the computational complexity and the power used to break the encryption. Quantum Key Distribution (QKD) is gaining popularity as a panacea to the issue of secure key distribution due to its ability to show secret keys' information-theoretic protection that is already suitable for commercialization. The goal is to generate a secret key between trusted parties connected through a quantum channel and an authenticated classical channel. The technology promises unconditional secure communication based on the principles of quantum mechanics without limiting the power of an eavesdropper. The first three sections provide a contemporary review of the Quantum Key Distribution in a nutshell. The remaining part of the paper deals with the key parameters and implementations that have been developed to assess the security of the leading experimental platforms and the challeng...
The security of practical quantum key distribution
Reviews of Modern Physics, 2009
Quantum key distribution ͑QKD͒ is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented ͑discrete-variable, continuous-variable, and distributed-phase-reference protocols͒.
Performance of two quantum-key-distribution protocols
Physical Review A, 2006
We compare the performance of Bennett-Brassard 1984 ͑BB84͒ and Scarani-Acin-Ribordy-Gisin 2004 ͑SARG04͒ protocols, the latter of which was proposed by V. Scarani et al. ͓Phys. Rev. Lett. 92, 057901 ͑2004͔͒. Specifically, in this paper, we investigate the SARG04 protocol with two-way classical communications and the SARG04 protocol with decoy states. In the first part of the paper, we show that the SARG04 scheme with two-way communications can tolerate a higher bit error rate ͑19.4% for a one-photon source and 6.56% for a two-photon source͒ than the SARG04 one with one-way communications ͑10.95% for a onephoton source and 2.71% for a two-photon source͒. Also, the upper bounds on the bit error rate for the SARG04 protocol with two-way communications are computed in a closed form by considering an individual attack based on a general measurement. In the second part of the paper, we propose employing the idea of decoy states in the SARG04 scheme to obtain unconditional security even when realistic devices are used. We compare the performance of the SARG04 protocol with decoy states and the BB84 one with decoy states. We find that the optimal mean-photon number for the SARG04 scheme is higher than that of the BB84 one when the bit error rate is small. Also, we observe that the SARG04 protocol does not achieve a longer secure distance and a higher key generation rate than the BB84 one, assuming a typical experimental parameter set.
Security Evaluation of Practical Quantum Communication Systems
2017
Modern information and communication technology (ICT), including internet, smart phones, cloud computing, global positioning system, e-commerce, e-Health, global communications and internet of things (IoT), all rely fundamentally – for identification, authentication, confidentiality and confidence – on cryptography. However, there is a high chance that most modern cryptography protocols will be annihilated upon the arrival of quantum computers. This necessitates taking steps for making the current ICT systems secure against quantum computers. The task is a huge and time-consuming task and there is a serious probability that quantum computers will arrive before it is complete. Hence, it is of utmost importance to understand the risk and start planning for the solution now. At this moment, there are two potential paths that lead to solution. One is the path of post-quantum cryptography: inventing classical cryptographic algorithms that are secure against quantum attacks. Although they...
Beyond the Limits of Shannon’s Information in Quantum Key Distribution
2021
We present a new post-processing method for Quantum Key Distribution (QKD) that raises cubically the secret key rate in the number of double matching detection events. In Shannon’s communication model, information is prepared at Alice’s side, and it is then intended to pass it over a noisy channel. In our approach, secret bits do not rely in Alice’s transmitted quantum bits but in Bob’s basis measurement choices. Therefore, measured bits are publicly revealed, while bases selections remain secret. Our method implements sifting, reconciliation, and amplification in a unique process, and it just requires a round iteration; no redundancy bits are sent, and there is no limit in the correctable error percentage. Moreover, this method can be implemented as a post-processing software into QKD technologies already in use.