2019
DOI: 10.3390/e21040387
|View full text |Cite
|
Sign up to set email alerts
|

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded

Abstract: An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called Quantum Key Distribution (QKD). Contrary to publicprivate key encryption, symmetric encryption is safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-inthe-middle attacks can be detected by c… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…From a purely engineering perspective, conventional laser communications are considered more secure than radio-based systems due to the much narrower diffraction limited beam divergences of optical links [249]. It is also necessary to examine the necessity for the full QKD mechanism when line-of-sight is guaranteed between transmitter and receiver, using other means, such as optical beacons, radar and optical observation [250]. In such cases, the concerns would be malicious Trojan-horse attacks by light injection into the receiver, or harvesting scattered light into the adversary's detector [251,252].…”
Section: Security Threatsmentioning
confidence: 99%
“…From a purely engineering perspective, conventional laser communications are considered more secure than radio-based systems due to the much narrower diffraction limited beam divergences of optical links [249]. It is also necessary to examine the necessity for the full QKD mechanism when line-of-sight is guaranteed between transmitter and receiver, using other means, such as optical beacons, radar and optical observation [250]. In such cases, the concerns would be malicious Trojan-horse attacks by light injection into the receiver, or harvesting scattered light into the adversary's detector [251,252].…”
Section: Security Threatsmentioning
confidence: 99%
“…However, this is not possible for the quantum channel where it would be detected promptly. One possible attack is a man-in-the-middle type attack [240,241], since the early quantum network parties can have a problem with authentication or trusted repeaters. Other types of attacks are considered at the quantum physics level; for example, a photon number splitting attack relies on utilising coherent laser pulses for the quantum channel [81] or the Trojan-horse attacks [82], or the collecting of scattered light and its detection [242].…”
Section: Key Pointsmentioning
confidence: 99%
“…Alternatively and taking into account the fact that the excess noise atop of the calibrated electronic noise of the detector appears most likely due to the imperfect estimation of a noiseless quantum channel, one may assume passive eavesdropping such that no untrusted channel excess noise is present. In the case of satellite-based links, where line of sight between the sender and the receiver suggests the absence of equipment capable of active eavesdropping, this is a particularly sensible assumption and it was applied recently for feasibility study of DV QKD over satellite links [ 45 ]. We also take this assumption into account in CV QKD by assuming the excess noise to be trusted (i.e., being out of control by an eavesdropper) and including it in the state purification using the scheme similar to the entangling cloner with a strongly unbalanced coupling to the signal prior to detection [ 37 ].…”
Section: CV Qkd Over Satellite Channelsmentioning
confidence: 99%