2008
DOI: 10.1103/physreva.78.042333
|View full text |Cite
|
Sign up to set email alerts
|

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems

Abstract: Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (∼4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the exper… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
376
0
1

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 518 publications
(377 citation statements)
references
References 32 publications
0
376
0
1
Order By: Relevance
“…In addition, errors in the state preparation performed by Alice have been considered in detail in the security analysis of our implementation (see Supplementary Note 1). Similarly, attacks exploiting the loophole introduced by detection efficiency mismatch, such as the time-shift attack [44][45][46] , are, in principle, excluded by the symmetrization procedure included in our experimental protocol. Finally, an effective countermeasure against the powerful blinding attack 47 , where the single-photon detectors are brought to a classical operation regime and can be fully controlled by the adversary, consists in randomly suppressing detector gates and emitting an alarm signal in case of registered detection events during those gates.…”
Section: Methodsmentioning
confidence: 99%
“…In addition, errors in the state preparation performed by Alice have been considered in detail in the security analysis of our implementation (see Supplementary Note 1). Similarly, attacks exploiting the loophole introduced by detection efficiency mismatch, such as the time-shift attack [44][45][46] , are, in principle, excluded by the symmetrization procedure included in our experimental protocol. Finally, an effective countermeasure against the powerful blinding attack 47 , where the single-photon detectors are brought to a classical operation regime and can be fully controlled by the adversary, consists in randomly suppressing detector gates and emitting an alarm signal in case of registered detection events during those gates.…”
Section: Methodsmentioning
confidence: 99%
“…Its feasibility has been promptly demonstrated both in laboratories and via field tests [24][25][26][27] . It successfully removes all (existing and yet to be discovered) detector side channels 3,5,6,[9][10][11] , which, arguably, is the most critical part of most QKD implementations. Importantly, in contrast to diQKD, this solution does not require that Alice and Bob perform a loophole-free Bell test; it is enough if they prove the presence of entanglement in a quantum state that is effectively distributed between them, just like in standard QKD schemes 28 .…”
mentioning
confidence: 99%
“…In practice, however, it does not, as most practical devices behave differently from the theoretical models assumed in the security proofs. As a result, we face implementation loopholes, or so-called side channels, which may be used by adversaries without being detected, as seen in recent attacks against certain commercial QKD systems [3][4][5][6][7][8][9][10][11] .…”
mentioning
confidence: 99%
“…Some implementations are, for example, susceptible to non-conforming light pulses that Eve sends into Alice's or Bob's devices. Eve could use reflectometry to read modulator states [12] or take control of the detectors by sending faked states [13,14], timeshifted pulses [15] or by detector blinding combined with faked states [16]. The impact of such interventions strongly depends on the particular implementation.…”
mentioning
confidence: 99%