2019
DOI: 10.1103/physreva.99.062315
|View full text |Cite
|
Sign up to set email alerts
|

Eavesdropper's ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence

Abstract: The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an attack could be ineffective in the presence of atmospheric turbulence due to beam wander and spatial mode aberrations induced by the air's varying index of refraction. We experimentally investigate the impact turbulence has on Eve's attack on a free-space polarization-… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…Most of the imperfections reviewed so far are in fiberbased QKD systems. There are also quantum attacks reported for free-space QKD systems (Chaiwongkhot et al, 2019;Nauerth et al, 2009;Sajeed et al, 2015a). For instance, imperfect encoding methods result in side channels from which encoded states are partially distinguishable (Nauerth et al, 2009).…”
Section: A Back-reflections and Eve's Photon Budgetmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the imperfections reviewed so far are in fiberbased QKD systems. There are also quantum attacks reported for free-space QKD systems (Chaiwongkhot et al, 2019;Nauerth et al, 2009;Sajeed et al, 2015a). For instance, imperfect encoding methods result in side channels from which encoded states are partially distinguishable (Nauerth et al, 2009).…”
Section: A Back-reflections and Eve's Photon Budgetmentioning
confidence: 99%
“…Eve can exploit this imperfection and launch the spatial-mode attack against a free-space QKD system. This problem has been carefully studied in (Chaiwongkhot et al, 2019;Sajeed et al, 2015a), following an earlier discussion on the origins of detection efficiency mismatch in (Fung et al, 2009). Besides DV-QKD, the practical security of CV-QKD also deserves future investigations, which will be reviewed in Section VII.C.…”
Section: A Back-reflections and Eve's Photon Budgetmentioning
confidence: 99%
“…The most effective countermeasure is a spatial mode filter (pinhole); however, this can also be vulnerable in itself due to laser‐induced damage [260]. Atmospheric turbulence will also reduce the efficiency of this attack [261]. The light‐injection attack can be extended to other components such as the quantum random number generators (QRNGs), with the output being biased by injected light [262].…”
Section: Space Quantum Communication Challengesmentioning
confidence: 99%
“…However, in practice, devices often behave differently than the assumed model, leaving a gap between theory and practice that can be exploited by an eavesdropper. This gap can be anywhere in the system implementation such as measurement devices [9,10], monitoring systems [11], assumption in the security proofs [12], leakage of information [13][14][15], change of characteristics [16,17], imperfect sources [18,19], imperfect detector characteristics [20][21][22][23] etc. It is essential for QKD security to explore and identify these gaps and characterize them in order to as-sess the threat.…”
Section: Introductionmentioning
confidence: 99%
“…It is essential for QKD security to explore and identify these gaps and characterize them in order to as-sess the threat. In this work we analyze one such gapdetector-efficiency mismatch [20,21,23,24]-and analyze its effects.…”
Section: Introductionmentioning
confidence: 99%