In principle, quantum key distribution (QKD) offers information-theoretic security based on the laws of physics. In practice, however, the imperfections of realistic QKD devices might introduce deviations from the idealized models used in the security analysis. Can quantum code-breakers successfully hack real QKD systems by exploiting the side channels? Can quantum code-makers design innovative counter-measures to foil quantum code-breakers? This article reviews theoretical and experimental progress in the practical security aspects of quantum code-making and quantum code-breaking. After numerous efforts, researchers have extensively understood and managed the practical imperfections, and the recent advances, such as the measurement-device-independent QKD protocol, have closed the critical side channels in the physical implementations, enabling secure QKD with realistic devices.
[1]
B. Gopinath,et al.
THE BELL SYSTEM
,
2019
.
[2]
Agnes Ferenczi,et al.
Security proof methods for quantum key distribution protocols
,
2013
.
[3]
N. Lutkenhaus,et al.
QUANTUM CRYPTOGRAPHY: FROM THEORY TO PRACTICE
,
2007,
quant-ph/0702202.
[4]
C. Terng.
Introduction to homological geometry: part II
,
2006
.
[5]
Ran Canetti,et al.
Universally composable security: a new paradigm for cryptographic protocols
,
2001,
Proceedings 2001 IEEE International Conference on Cluster Computing.