Using Modeling and Simulation to Study Photon Number Splitting Attacks

Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key distribution channel necessarily introduces detectable errors and shows promise for high-security environments, such as banking, government, and military. However, QKD systems are vulnerable to advanced theoretical and experimental attacks. In this paper, the photon number splitting (PNS) attack is studied in a specialized QKD modeling and simulation framework. First, a detailed treatment of the PNS attack is provided with emphasis on practical considerations, such as performance limitations and realistic sources of error. Second, ideal and non-ideal variations of the PNS attack are studied to measure the eavesdropper's information gain on the QKD-generated secret key bits and examine the detectability of PNS attacks with respect to both quantum bit error rate and the decoy state protocol. Finally, this paper provides a repeatable methodology for efficiently studying advanced attacks, both realized and notional, against QKD systems and more generally quantum communication protocols.

[1]  Philippe Grangier,et al.  Quantum non-demolition measurements in optics , 1998, Nature.

[2]  J. M. Ettinger,et al.  Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.

[3]  Hoi-Kwong Lo,et al.  A brief introduction of quantum cryptography for engineers , 2010, 1002.1237.

[4]  Stephen M. Barnett,et al.  Conditional beam-splitting attack on quantum key distribution , 2001 .

[5]  Gerald Baumgartner,et al.  Performance Evaluations of Quantum Key Distribution System Architectures , 2015, IEEE Security & Privacy.

[6]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[7]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[8]  J. H. Müller,et al.  Quantum memories , 2010, 1003.1107.

[9]  Dong Liu,et al.  Field and long-term demonstration of a wide area quantum key distribution network , 2014, Optics express.

[10]  M. Williamson,et al.  Eavesdropping on practical quantum cryptography , 2002, quant-ph/0211155.

[11]  Matthews T. Reynolds Test and Evaluation of Complex Systems , 1997 .

[12]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[13]  Nicolas Gisin,et al.  Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks , 2004 .

[14]  Chip Elliott,et al.  Quantum Cryptography , 2004, IEEE Secur. Priv..

[15]  B. Sanders,et al.  Optical quantum memory , 2009, 1002.4659.

[16]  Gerald Baumgartner,et al.  Quantum key distribution: examination of the decoy state protocol , 2015, IEEE Communications Magazine.

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  W. Grice Arbitrarily complete Bell-state measurement using only linear optical elements , 2011 .

[19]  Michael R. Grimaila,et al.  A Modeling Framework for Studying Quantum Key Distribution System Implementation Nonidealities , 2015, IEEE Access.

[20]  Xiang-Bin Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .

[21]  N. Imoto,et al.  Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.

[22]  R. Hadfield Single-photon detectors for optical quantum information applications , 2009 .

[23]  Michael R. Grimaila,et al.  Modeling decoy state Quantum Key Distribution systems , 2015 .

[24]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[25]  P. Knight,et al.  Introductory quantum optics , 2004 .

[26]  G. S. Vernam Cipher printing telegraph systems: For secret wire and radio telegraphic communications , 2022, Journal of the A.I.E.E..

[27]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[28]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[29]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[30]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[31]  A R Dixon,et al.  High speed prototype quantum key distribution system and long term field trial. , 2015, Optics express.

[32]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.

[33]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[34]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[35]  J. Raimond,et al.  Seeing a single photon without destroying it , 1999, Nature.

[36]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[37]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[38]  Valerio Scarani,et al.  The black paper of quantum cryptography: Real implementation problems , 2009, Theor. Comput. Sci..

[39]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[40]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[41]  V. Scarani,et al.  Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography , 2004, quant-ph/0408122.