Reversed Space Attacks

Many quantum key distribution (QKD) schemes are based on sending and measuring qubits -- two-dimensional quantum systems. Yet, in practical realizations and experiments, the measuring devices at the receiver's (Bob) site commonly do not measure a two-dimensional system but rather a quantum space of a larger dimension. Such an enlargement sometimes results from imperfect devices. However, in various QKD protocols such enlargement exists even in the ideal scenario when all devices are assumed to be perfect. This issue is common, for instance, in QKD schemes implemented via photons, where the parties' devices are based on Mach-Zehnder interferometers, as these inherently enlarge the quantum space in use. We show how space enlargement at Bob's site exposes the implemented protocol to new kinds of attacks, attacks that have not yet been explicitly pinpointed nor rigorously analyzed. We name these the "reversed space attacks". A key insight in formalizing our attacks, is the idea of taking all states defining Bob's (large) measured space and reversing them in time in order to identify precisely the space that an eavesdropper may attack. We employ such attacks on two variants of intereferometric-based QKD recently experimented by several groups, and show how to get full information on the qubit sent by Alice, while inducing no errors at all. The technique we develop here has subsequently been used in a closely related work (Boyer, Gelles, and Mor, Physical Review A, 2014) to demonstrate a (weaker variant of) reversed-space attack on both interferometric-based and polarization-based QKD.

[1]  Johannes Skaar,et al.  Security of quantum key distribution with arbitrary individual imperfections , 2009, 0903.3525.

[2]  Yoshihiro Nambu,et al.  BB84 Quantum Key Distribution System Based on Silica-Based Planar Lightwave Circuits , 2004, quant-ph/0404015.

[3]  N. Lutkenhaus Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.

[4]  J.-W. Park,et al.  No-Clicking Event in the Quantum Key Distribution , 2004 .

[5]  M. Dušek,et al.  Chapter 5 - Quantum cryptography , 2006, quant-ph/0601207.

[6]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[7]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[8]  Paul D. Townsend,et al.  Asymmetric Mach-Zehnder germano-silicate channel waveguide interferometers for quantum cryptography systems , 2001 .

[9]  Alexander V. Sergienko,et al.  Entangled States in Quantum Key Distribution , 2006 .

[10]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[11]  Adrian Kent,et al.  Unconditionally secure device-independent quantum key distribution with only two devices , 2012, ArXiv.

[12]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[13]  Debbie W. Leung,et al.  The Universal Composable Security of Quantum Key Distribution , 2004, TCC.

[14]  M. Beck Introductory Quantum Optics , 2005 .

[15]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[16]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[17]  T. Hatanaka,et al.  Planar lightwave circuits for quantum cryptographic systems , 2003, quant-ph/0307074.

[18]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[19]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[20]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[21]  Richard Hughes,et al.  Quantum crytography over 14km of installed optical fiber , 1996 .

[22]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[23]  N. Gisin,et al.  Quantum cryptography , 1998 .

[24]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[25]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[26]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[27]  Dag R. Hjelme,et al.  Faked states attack on quantum cryptosystems , 2005 .

[28]  Akihisa Tomita,et al.  Photonic Realization of Quantum Information Systems , 2006 .

[29]  James F. Dynes,et al.  Practical gigahertz quantum key distribution based on avalanche photodiodes , 2009 .

[30]  Ran Gelles,et al.  Attacks on Fixed Apparatus Quantum Key Distribution Schemes , 2012, TPNC.

[31]  M. Teich,et al.  Decoherence-free subspaces in quantum key distribution. , 2003, Physical review letters.

[32]  Ran Gelles,et al.  On the Security of Interferometric Quantum Key Distribution , 2011, TPNC.

[33]  Biham,et al.  Quantum cryptographic network based on quantum memories. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[34]  Vaidman,et al.  Properties of a quantum system during the time interval between two measurements. , 1990, Physical review. A, Atomic, molecular, and optical physics.

[35]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[36]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[37]  Richard J. Hughes,et al.  Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.

[38]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[39]  Reck,et al.  Experimental realization of any discrete unitary operator. , 1994, Physical review letters.

[40]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[41]  T. Mor,et al.  Quantum-Space Attacks , 2007, 0711.3019.

[42]  Akihisa Tomita,et al.  Single-photon Interference over 150 km Transmission Using Silica-based Integrated-optic Interferometers for Quantum Cryptography , 2004, quant-ph/0403104.

[43]  J. Lebowitz,et al.  TIME SYMMETRY IN THE QUANTUM PROCESS OF MEASUREMENT , 1964 .

[44]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.