Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.
We propose and experimentally verify a scheme to engineer arbitrary states of traveling light field up to the two-photon level. The desired state is remotely prepared in the signal channel of spontaneous parametric down-conversion by means of conditional measurements on the idler channel. The measurement consists of bringing the idler field into interference with two ancilla coherent states, followed by two single-photon detectors, which, in coincidence, herald the preparation event. By varying the amplitudes and phases of the ancillae, we can prepare any arbitrary superposition of zero-one-and two-photon states. PACS numbers:Modern quantum information science relies upon two key concepts -superposition and entanglement. As fundamental tenets of quantum mechanics, they govern the way information can be shared, transferred or measured. This information lives in a Hilbert space, in the form of a quantum state. Consequently, the ability to actively control the coherent dynamics of a quantum state is paramount for quantum information technology. This task forms the essence of quantum state engineering (QSE). In the optical domain, a widely-used approach for QSE involves generating a "primitive" quantum state and then manipulating it, for example, by bringing it into interaction with an ancillary system. Employing appropriate measurements, the ancilla is then traced out, leading to reduction of the overall system to the desired target state, ready to be detected and characterized.In modern quantum optics, the "primitive" is commonly the state of correlated photon pairs produced in spontaneous parametric down conversion (SPDC). Conditional photon detection on one or both channels is then employed to produce the state of interest. This technique has been successfully applied to engineer complex entangled states of dual-rail optical qubits [1], albeit mostly in a postselected manner: we do not know that the state has been prepared until it is detected and destroyed. A fundamental impediment to optical QSE arises because equidistant energy levels of a harmonic oscillator (such as an electromagnetic mode) cannot be individually accessed using classical control signals. Outside the optical domain, this challenge has been addressed in ion traps [8] and high-Q microwave cavities [9] by coupling the oscillator energy eigenstates to a two-level atomic or spin system [10]. Very recently, arbitrary superposition of Fock states were synthesized inside a superconducting cavity by means of coupling to a Josephson phase qubit [11]. However, the loss of coherence in this scheme provides a fundamental limitation to the obtainable accuracy and complexity of the prepared state.While traveling field implementations do not suffer from this kind of decoherence and also automatically satisfy DiVincenzo's criterion of "flying qubits" [12], they are still beset with the problem of inefficiencies and losses. There exist a number of theoretical proposals for implementing optical QSE [reviewed in detail in [13]], for example, using coherent disp...
Granular flow in a rotating tumbler is of theoretical and industrial significance. However, in spite of its relative simplicity, little is known about the dynamics of the top flowing layer. Here we present an experimental study of the velocity field within the fluidized layer of monodisperse particles in a quasi-2D ͑two-dimensional͒ rotating tumbler in the rolling flow regime using particle tracking velocimetry. The granular flow is illuminated by a laser flash and recorded using a charge coupled device camera. Image processing is used to remove the experimental noise and to achieve sub-pixel accuracy in calculating the particle displacements. The ensemble-averaged streamwise and transverse velocity profiles are calculated based on the particle displacements for three angular velocities and three bead sizes. The normalized streamwise velocity profile is linear throughout the fluidized layer, but becomes logarithmic as it enters the ''fixed'' bed where slow particle rearrangements dominate. The rms velocities appear to be exponentially related to the depth in the layer. Nondimensionalizing the number density in the fluidized layer with a geometric factor based on the square packing results in collapse of the data over a range of bead sizes and angular velocities.
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright light from the quantum channel and analyzing the backreflections. We propose and experimentally demonstrate a setup for mounting such a Trojan-horse attack. We show it in operation against the quantum cryptosystem Clavis2 from ID Quantique, as a proof-of-principle. With just a few back-reflected photons, Eve discerns Bobʼs (secret) basis choice, and thus the raw key bit in the Scarani-Acín-Ribordy-Gisin 2004 protocol, with higher than 90% probability. This would clearly breach the security of the cryptosystem. Unfortunately, Eveʼs bright pulses have a side effect of causing a high level of afterpulsing in Bobʼs single-photon detectors, resulting in a large quantum bit error rate that effectively protects this system from our attack. However, in a Clavis2like system equipped with detectors with less-noisy but realistic characteristics, an attack strategy with positive leakage of the key would exist. We confirm this by a numerical simulation. Both the eavesdropping setup and strategy can be generalized to attack most of the current QKD systems, especially if they lack proper safeguards. We also propose countermeasures to prevent such attacks.
We introduce the concept of a superlinear threshold detector, a detector that has a higher probability to detect multiple photons if it receives them simultaneously rather than at separate times. Highly superlinear threshold detectors in quantum key distribution systems allow eavesdropping the full secret key without being revealed. Here, we generalize the detector control attack, and analyze how it performs against quantum key distribution systems with moderately superlinear detectors. We quantify the superlinearity in superconducting single-photon detectors based on earlier published data, and gated avalanche photodiode detectors based on our own measurements. The analysis shows that quantum key distribution systems using detector(s) of either type can be vulnerable to eavesdropping. The avalanche photodiode detector becomes superlinear toward the end of the gate. For systems expecting substantial loss, or for systems not monitoring loss, this would allow eavesdropping using trigger pulses containing less than 120 photons per pulse. Such an attack would be virtually impossible to catch with an optical power meter at the receiver entrance
The industrial production and commercial applications of titanium dioxide nanoparticles have increased considerably in recent times, which has increased the probability of environmental contamination with these agents and their adverse effects on living systems. This study was designed to assess the genotoxicity potential of TiO2 NPs at high exposure concentrations, its bio-uptake, and the oxidative stress it generated, a recognised cause of genotoxicity. Allium cepa root tips were treated with TiO2 NP dispersions at four different concentrations (12.5, 25, 50, 100 µg/mL). A dose dependant decrease in the mitotic index (69 to 21) and an increase in the number of distinctive chromosomal aberrations were observed. Optical, fluorescence and confocal laser scanning microscopy revealed chromosomal aberrations, including chromosomal breaks and sticky, multipolar, and laggard chromosomes, and micronucleus formation. The chromosomal aberrations and DNA damage were also validated by the comet assay. The bio-uptake of TiO2 in particulate form was the key cause of reactive oxygen species generation, which in turn was probably the cause of the DNA aberrations and genotoxicity observed in this study.
Abstract-An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a bright pulse from the quantum channel into the system and analyzing the backreflected pulses. Such Trojan-horse attacks can breach the security of the QKD system if appropriate safeguards are not installed or if they can be fooled by Eve. We present a risk analysis of such attacks based on extensive spectral measurements, such as transmittance, reflectivity, and detection sensitivity of some critical components used in typical QKD systems. Our results indicate the existence of wavelength regimes where the attacker gains considerable advantage as compared to launching an attack at 1550 nm. We also propose countermeasures to reduce the risk of such attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.