2016
DOI: 10.1103/physreva.94.030302
|View full text |Cite
|
Sign up to set email alerts
|

Creation of backdoors in quantum communications via laser damage

Abstract: Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behaviour ondemand. We test it on two practical QC systems for key distribution and coin-tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
64
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 70 publications
(64 citation statements)
references
References 43 publications
0
64
0
Order By: Relevance
“…Single photon detector (SPD) is an indispensable component for a BB84 QKD system, but as a complex one at the receiver's part, there are many loopholes that Eve can exploit to hack the system [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. Recently, a series of hacking, named as detector control attacks, have been proposed [21][22][23][24][25][26][27][28][29].…”
mentioning
confidence: 99%
“…Single photon detector (SPD) is an indispensable component for a BB84 QKD system, but as a complex one at the receiver's part, there are many loopholes that Eve can exploit to hack the system [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29]. Recently, a series of hacking, named as detector control attacks, have been proposed [21][22][23][24][25][26][27][28][29].…”
mentioning
confidence: 99%
“…We describe one such possible assumption, assuming that Eve cannot increase the single photon detection efficiency beyond some value η max to fool the estimation procedure. This assumption seems reasonably safe, given that the setup prevents the use of laser damage [48,49]. Under this assumption, as long as the estimated single photon η E is close to η max , the key rate before error correction is the same as in QKD with perfect equipment multiplied by the single photon detection efficiency.…”
Section: Discussionmentioning
confidence: 99%
“…Bounding the power of Eve's pulse is helpful in our security analysis. Also, deprived of the possibility of sending strong pulses, we may assume that Eve cannot radically change the behavior of the optical elements in Bob's system via laser damage [48,49].…”
Section: Modifications To Bobmentioning
confidence: 99%
“…In a source's apparatus, an optical attenuator is usually the last component that optical pulses go through before they are sent to a quantum channel [28,[37][38][39][40][41][42][43][44][45] However, for Eve, the attenuator is the first component she sees, looking at the source's apparatus from the network side. High-power laser damage of other components in QKD systems has been demonstrated before [10,13]. We suspect that a high-power laser shining through the output fiber to the source can affect the performance of the attenuator.…”
Section: Introductionmentioning
confidence: 93%