2021
DOI: 10.3390/e23050509
|View full text |Cite
|
Sign up to set email alerts
|

Nonclassical Attack on a Quantum Key Distribution System

Abstract: The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method. Particularly noteworthy is that this is not a classic attack on a quantum protocol. We describe an attack on the process of calibration. Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components. The described type of attack does not affect the cryptographic strength of the received keys an… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Finally, in an OTDR based sensor system, using EDFA has created an experimental knowledge base regarding gain, insertion loss, and pumping configurations, which would be worth merging with the analytical model derived here [30][31][32][33][34].…”
Section: Discussion and Potential Model Enhancementsmentioning
confidence: 99%
“…Finally, in an OTDR based sensor system, using EDFA has created an experimental knowledge base regarding gain, insertion loss, and pumping configurations, which would be worth merging with the analytical model derived here [30][31][32][33][34].…”
Section: Discussion and Potential Model Enhancementsmentioning
confidence: 99%
“…The more information traffic increases, the more data security should be emphasized. Current information security relies on computational complexity [2] and is thus vulnerable to both classical [3] and quantum attacks [4][5][6]. In classical cryptography such as public key cryptography [7], the key length has gradually increased over decades to protect data from potential eavesdropping, mostly relying on computing power [8].…”
Section: Introductionmentioning
confidence: 99%
“…Magnetic nanofibers are of great interest for basic research of their magnetic properties as well as for possible applications in spintronics, neuromorphic computing and data transfer [ 21 , 22 , 23 ]. Secure data transfer is of great interest nowadays and requires effective strategies [ 24 , 25 ]. For some kinds of applications, nanofiber mats with agglomeration and beads are advantageous because magnetic nanoparticles collect in beads and thus form a network with nodes [ 2 ].…”
Section: Introductionmentioning
confidence: 99%
“…In our previous study by Döpke et al, PAN/magnetite nanofiber mats were prepared and the magnetic properties were investigated [ 2 ]. Here, networks of magnetic nanofibers with beads that can be used to transport data in the form of domain walls moving along them and combined with objects that could be used to store data and transport [ 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 …”
Section: Introductionmentioning
confidence: 99%