2020
DOI: 10.1103/physrevapplied.13.034008
|View full text |Cite
|
Sign up to set email alerts
|

Hacking Quantum Key Distribution via Injection Locking

Abstract: Unconditionally secure communication, being pursued for thousands of years, however, hasn't been reached yet due to continuous competitions between encryption and hacking. Quantum key distribution (QKD), harnessing the quantum mechanical nature of superposition and non-cloning, may promise unconditional security by incorporating the one-time pad algorithm rigorously proved by Claude Shannon. Massive efforts have been made in building practical and commercial QKD systems, in particular, decoy states are employe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(26 citation statements)
references
References 34 publications
1
25
0
Order By: Relevance
“…Indeed, this value of injection power has been also confirmed recently by the experimental results shown in Ref. [59], in which Eve's injection power is in 100-160 nW range. We also note that a real QKD system may use a laser diode without the internal isolator, then the injection power used in our laser seeding attack may be reduced to the above level.…”
Section: Resultssupporting
confidence: 76%
See 3 more Smart Citations
“…Indeed, this value of injection power has been also confirmed recently by the experimental results shown in Ref. [59], in which Eve's injection power is in 100-160 nW range. We also note that a real QKD system may use a laser diode without the internal isolator, then the injection power used in our laser seeding attack may be reduced to the above level.…”
Section: Resultssupporting
confidence: 76%
“…In practice, it is important to note as well that Eve could in principle combine the laser seeding attack with various attacks to enhance her hacking capability, for example, with the laser damage attack [22,24] as mentioned above, with the THA analysed in Refs. [48-50, 53, 72, 73], and/or with the recently introduced injection-locking attack [59]. For instance, Eve could employ the fact that the laser seeding can be affected in real time by the state of Alice's modulator, changing the laser wavelength depending on the modulator setting [59] and/or modulating the intensity multiplication factor κ.…”
Section: Discussion and Countermeasurementioning
confidence: 99%
See 2 more Smart Citations
“…Light coming from the wrong direction in the normal QKD optical channel can also alter the intended operation of the system. For instance, external laser light can alter the photon sources in QKD devices and has been shown to weaken security either by seeding the source laser so that consecutive pulses are not phase-independent [ 75 ], altering the wavelength to identify the state choice [ 76 , 77 ], increasing the mean photon number [ 23 , 60 , 77 ], or performing laser machining to physically alter the components inside the QKD setup [ 26 , 61 ]. In this paper, we have focused on light entering from unsuspected places, such as ventilation openings.…”
Section: Discussion and Recommendationsmentioning
confidence: 99%