Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections and may thus violate some of the assumptions in the security proofs of QKD. It is important to explore these assumptions. One key assumption is that the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we perform a proof-of-principle experiment to demonstrate a technically feasible 'intercept- and-resend' attack that exploits such a security loophole in a commercial 'plug & play' QKD system. The resulting quantum bit error rate is 19.7%, which is substantially lower than the well-known 25% error rate for an intercept-and-resend attack in BB84. The attack we utilize is the phase-remapping attack (Fung et al 2007 Phys. Rev. A 75 32314) proposed by our group.

[1]  Physical Review , 1965, Nature.

[2]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[3]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[4]  Pochi Yeh,et al.  Photonics: Optical Electronics in Modern Communications (The Oxford Series in Electrical and Computer Engineering) , 1997 .

[5]  Axthonv G. Oettinger,et al.  IEEE Transactions on Information Theory , 1998 .

[6]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[7]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[8]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[9]  Michael Priestley,et al.  Proceedings of IEEE Professional Communication Society International Professional Communication Conference and Proceedings of the 18th Annual ACM International Conference on Computer Documentation: Technology & Teamwork, Cambridge, Massachusetts, USA, September 24-27, 2000 , 2000, SIGDOC.

[10]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[11]  Andrew G. Glen,et al.  APPL , 2001 .

[12]  T. Nishioka,et al.  "Circular type" quantum key distribution , 2001, IEEE Photonics Technology Letters.

[13]  H. Chau Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate , 2002 .

[14]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[15]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[16]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[17]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[18]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[19]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[20]  Debbie W. Leung,et al.  The Universal Composable Security of Quantum Key Distribution , 2004, TCC.

[21]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[22]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[23]  P. Yeh,et al.  Photonics : optical electronics in modern communications , 2006 .

[24]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[25]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[26]  New Journal of Physics The , 2007 .

[27]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[28]  Christian Kurtsiefer,et al.  Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.

[29]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[30]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[31]  Oleg E. Melnik,et al.  Encyclopedia of Complexity and Systems Science , 2008 .

[32]  Xiongfeng Ma,et al.  Security proof of quantum key distribution with detection efficiency mismatch , 2008, Quantum Inf. Comput..

[33]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[34]  V. Makarov Controlling passively quenched single photon detectors by bright light , 2007, 0707.3987.

[35]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.