Ivan S. Sushchev, Daniil S. Bulavkin, Kirill E. Bugai, Anna S. Sidelnikova, Dmitriy A. Dvoretskiy
{"title":"对真实世界量子密钥分发系统的木马攻击:理论与实验安全分析","authors":"Ivan S. Sushchev, Daniil S. Bulavkin, Kirill E. Bugai, Anna S. Sidelnikova, Dmitriy A. Dvoretskiy","doi":"10.1103/physrevapplied.22.034032","DOIUrl":null,"url":null,"abstract":"This paper presents a theoretical and experimental demonstration of a security analysis of a Trojan-horse attack (THA) on a real-world quantum key distribution (QKD) system. We show that the upper bound on the information leakage depends solely on the fidelity between the states of the adversary. We find the lower bound for fidelity between THA states in both the polarization- and phase-coding BB84 protocols, considering both pure and mixed states. Our bounds depend only on the mean photon number per pulse available to an adversary. We also present an experimental analysis of a QKD system, including optical time-domain reflectometry measurements with centimeter resolution and spectral transmittance measurements for optical defense elements ranging from 1100 to 1800 nm with a noise floor lower than <math display=\"inline\" overflow=\"scroll\" xmlns=\"http://www.w3.org/1998/Math/MathML\"><mo>−</mo><mn>100</mn></math> dB. Finally, by considering the optimal attack, we obtain the value of the mean photon number per pulse available to an adversary and calculate the key leakage that needs to be eliminated during the privacy amplification procedure.","PeriodicalId":20109,"journal":{"name":"Physical Review Applied","volume":"31 1","pages":""},"PeriodicalIF":3.8000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis\",\"authors\":\"Ivan S. Sushchev, Daniil S. Bulavkin, Kirill E. Bugai, Anna S. Sidelnikova, Dmitriy A. Dvoretskiy\",\"doi\":\"10.1103/physrevapplied.22.034032\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a theoretical and experimental demonstration of a security analysis of a Trojan-horse attack (THA) on a real-world quantum key distribution (QKD) system. We show that the upper bound on the information leakage depends solely on the fidelity between the states of the adversary. We find the lower bound for fidelity between THA states in both the polarization- and phase-coding BB84 protocols, considering both pure and mixed states. Our bounds depend only on the mean photon number per pulse available to an adversary. We also present an experimental analysis of a QKD system, including optical time-domain reflectometry measurements with centimeter resolution and spectral transmittance measurements for optical defense elements ranging from 1100 to 1800 nm with a noise floor lower than <math display=\\\"inline\\\" overflow=\\\"scroll\\\" xmlns=\\\"http://www.w3.org/1998/Math/MathML\\\"><mo>−</mo><mn>100</mn></math> dB. Finally, by considering the optimal attack, we obtain the value of the mean photon number per pulse available to an adversary and calculate the key leakage that needs to be eliminated during the privacy amplification procedure.\",\"PeriodicalId\":20109,\"journal\":{\"name\":\"Physical Review Applied\",\"volume\":\"31 1\",\"pages\":\"\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2024-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Physical Review Applied\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://doi.org/10.1103/physrevapplied.22.034032\",\"RegionNum\":2,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"PHYSICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Physical Review Applied","FirstCategoryId":"101","ListUrlMain":"https://doi.org/10.1103/physrevapplied.22.034032","RegionNum":2,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"PHYSICS, APPLIED","Score":null,"Total":0}
Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis
This paper presents a theoretical and experimental demonstration of a security analysis of a Trojan-horse attack (THA) on a real-world quantum key distribution (QKD) system. We show that the upper bound on the information leakage depends solely on the fidelity between the states of the adversary. We find the lower bound for fidelity between THA states in both the polarization- and phase-coding BB84 protocols, considering both pure and mixed states. Our bounds depend only on the mean photon number per pulse available to an adversary. We also present an experimental analysis of a QKD system, including optical time-domain reflectometry measurements with centimeter resolution and spectral transmittance measurements for optical defense elements ranging from 1100 to 1800 nm with a noise floor lower than dB. Finally, by considering the optimal attack, we obtain the value of the mean photon number per pulse available to an adversary and calculate the key leakage that needs to be eliminated during the privacy amplification procedure.
期刊介绍:
Physical Review Applied (PRApplied) publishes high-quality papers that bridge the gap between engineering and physics, and between current and future technologies. PRApplied welcomes papers from both the engineering and physics communities, in academia and industry.
PRApplied focuses on topics including:
Biophysics, bioelectronics, and biomedical engineering,
Device physics,
Electronics,
Technology to harvest, store, and transmit energy, focusing on renewable energy technologies,
Geophysics and space science,
Industrial physics,
Magnetism and spintronics,
Metamaterials,
Microfluidics,
Nonlinear dynamics and pattern formation in natural or manufactured systems,
Nanoscience and nanotechnology,
Optics, optoelectronics, photonics, and photonic devices,
Quantum information processing, both algorithms and hardware,
Soft matter physics, including granular and complex fluids and active matter.