Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].

[1]  H. Chau Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .

[2]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[3]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[4]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[5]  Cheng-Zhi Peng,et al.  Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source , 2007 .

[6]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.

[7]  Jian-Wei Pan,et al.  Decoy-state quantum key distribution with polarized photons over 200 km. , 2010, Optics express.

[8]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[9]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[10]  B Baek,et al.  Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.

[11]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[12]  Shi-Hai Sun,et al.  Proof-of-principle experiment of a modified photon-number-splitting attack against quantum key distribution , 2011 .

[13]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[14]  Vadim Makarov,et al.  Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols , 2007, Quantum Inf. Comput..

[15]  Shi-Hai Sun,et al.  Experimental demonstration of an active phase randomization and monitor module for quantum key distribution , 2012 .

[16]  G. Guo,et al.  Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack , 2013, 1302.0090.

[17]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[18]  Mu-Sheng Jiang,et al.  Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system , 2011, 1203.0739.

[19]  Yi Zhao,et al.  Experimental quantum key distribution with active phase randomization , 2006, quant-ph/0611059.

[20]  Michael Jetter,et al.  Electrically driven quantum dot single-photon source at 2 GHz excitation repetition rate with ultra-low emission time jitter , 2013 .

[21]  Mu-Sheng Jiang,et al.  Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .

[23]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[24]  Jian Wang,et al.  Decoy-state quantum key distribution with polarized photons over 200 km. , 2009, Optics express.

[25]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[26]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[27]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[28]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[29]  John Preskill,et al.  Security of quantum key distribution using weak coherent states with nonrandom phases , 2007, Quantum Inf. Comput..

[30]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[31]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[32]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[33]  Jian-Wei Pan,et al.  Decoy-state quantum key distribution with both source errors and statistical fluctuations , 2009, 0902.4660.

[34]  Xiang-Bin Wang,et al.  Decoy-state quantum key distribution with large random errors of light intensity , 2007 .

[35]  Ryo Namiki,et al.  Security of quantum cryptography using balanced homodyne detection , 2002, quant-ph/0205191.

[36]  P. Bhattacharya,et al.  An electrically driven quantum dot-in-nanowire visible single photon source operating up to 150 K , 2013 .

[37]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[38]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[39]  N. Gisin,et al.  High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres , 2009, 0903.3907.

[40]  Chun-Yan Li,et al.  Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .

[41]  S. Assefa,et al.  Heralded single photons from a silicon nanophotonic chip , 2012, 2012 Conference on Lasers and Electro-Optics (CLEO).

[42]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[43]  Bingjie Xu,et al.  Experimental quantum-key distribution with an untrusted source. , 2008, Optics letters.

[44]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[45]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[46]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[47]  R. Namiki,et al.  Quantum cryptography using pulsed homodyne detection , 2000, quant-ph/0008037.

[48]  H. Lo,et al.  Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.

[49]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[50]  S. Braunstein,et al.  Quantum Information with Continuous Variables , 2004, quant-ph/0410100.

[51]  Feihu Xu,et al.  Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.

[52]  Jian-Wei Pan,et al.  General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.

[53]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[54]  Nicolas Gisin,et al.  Quantum key distribution and 1 Gbps data encryption over a single fibre , 2009, 0912.1798.

[55]  H. Lo,et al.  Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers , 2007, 0709.3666.

[56]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[57]  H. Weinfurter,et al.  Information leakage via side channels in freespace BB84 quantum cryptography , 2009 .

[58]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[59]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[60]  N. Gisin,et al.  “Plug and play” systems for quantum cryptography , 1996, quant-ph/9611042.

[61]  L. Liang,et al.  Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.

[62]  Zheshen Zhang,et al.  Security of a discretely signaled continuous variable quantum key distribution protocol for high rate systems. , 2009, Optics express.

[63]  Chun-Yan Li,et al.  Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.

[64]  H. Weinfurter,et al.  Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.

[65]  C. G. Peterson,et al.  Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.

[66]  Bingjie Xu,et al.  Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system , 2010, 1002.0196.

[67]  S. Montangero,et al.  Room temperature Rydberg Single Photon Source , 2012, 1212.2811.

[68]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[69]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[70]  Chun-Yan Li,et al.  Partially random phase attack to the practical two-way quantum-key-distribution system , 2012, 1305.5985.

[71]  Yi Zhao,et al.  Quantum key distribution with an unknown and untrusted source , 2008, 0802.2725.

[72]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[73]  E S Polzik,et al.  High purity bright single photon source. , 2007, Optics express.

[74]  Mu-Sheng Jiang,et al.  Frequency shift attack on ‘plug-and-play’ quantum key distribution systems , 2014 .

[75]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[76]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[77]  Dong Liu,et al.  Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.

[78]  Seth Lloyd,et al.  Gaussian quantum information , 2011, 1110.3234.

[79]  Wang Chuan,et al.  Quantum secure direct communication and deterministic secure quantum communication , 2007 .

[80]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[81]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.