Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
Review
. 2022 Feb 10;24(2):260.
doi: 10.3390/e24020260.

A Review of Security Evaluation of Practical Quantum Key Distribution System

Affiliations
Review

A Review of Security Evaluation of Practical Quantum Key Distribution System

Shihai Sun et al. Entropy (Basel). .

Abstract

Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown.

Keywords: practical security; quantum communication; quantum cryptography; quantum key distribution; security evaluation.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The concept communication model of a QKD system, which includes five modules: source, encoder, channel, decoder and detector. The source generates the required optical pulse, single photon pulse for BB84, or the weak coherent pulses with different average intensities. The encoder and decoder transform two classical bits into quantum states, back and forth. The detector absorbs the photon and registers the click of SPDs. The detailed definition and security requirement for each module are given in the main text.
Figure 2
Figure 2
The phase distribution and intensity with and without Eve’s laser-injection attack, reprinted from Refs. [30,31]. (a,b) Phase distribution of Alice’s adjacent pulses tested from two samples of ID300 lasers. Without Eve’s attack, the phase is random. However, under 50 μW or 100 μW of Eve’s injected light, the phase follows a Gaussian distribution. (c) The increased intensity under laser-injection attack.
Figure 3
Figure 3
The experimental measurement of distinguishable states. (a) The pulse shapes of the decoy state and the signal state driven by electrical current. Reprinted from Ref. [32]. (b) Four encoded signal states and decoy states generated by individual laser diodes. Reprinted from Ref. [33].
Figure 4
Figure 4
The typical testing result of intersymbol interference, which shows the intensity correlation between neighboring pulses. Reprinted from Ref. [34].
Figure 5
Figure 5
The testing results of the laser damage attack on attenuator. (a) The attenuation values before and after the laser damage attack. (b) The attenuator with the damaged areas. Reprinted from Ref. [38].
Figure 6
Figure 6
The working principle of Trojan horse attack. Reprinted from Ref. [44].
Figure 7
Figure 7
The change of coupling ratio depending on the wavelength, which can be exploited by Eve to conduct the wavelength-dependent attack. Reprinted from Ref. [48].
Figure 8
Figure 8
The working principle of time-shift attack. (a) The typical mismatched curves of detection efficiency. (b) The scheme of experimental demonstration. Reprinted from Ref. [49].
Figure 9
Figure 9
The illustration of dead-time attack. Reprinted from Ref. [52]. (a) The scheme of the dead-time attack; (b) the timings of faked pulses and signal pulses with detection efficiency of signal pulses under dead-time attack.
Figure 10
Figure 10
The illustration of the blinding attack. (a) The equivalent circuit related to the APD in a detector, reprinted from [56]; (b) the working modes of a APD, reprinted from Ref. [26].

References

    1. Bennett C.H., Brassard G. Quantum cryptography: Public key distribution and con tossing; Proceedings of the International Conference on Computers, Systems and Signal Processing; Bangalore, India. 9–12 December 1984; pp. 175–179.
    1. Inoue K., Waks E., Yamamoto Y. Differential Phase Shift Quantum Key Distribution. Phys. Rev. Lett. 2002;89:037902. doi: 10.1103/PhysRevLett.89.037902. - DOI - PubMed
    1. Stucki D., Brunner N., Gisin N., Scarani V., Zbinden H. Fast and simple one-way quantum key distribution. Appl. Phys. Lett. 2005;87:194108. doi: 10.1063/1.2126792. - DOI
    1. Branciard C., Gisin N., Scarani V. Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography. New J. Phys. 2008;10:013031. doi: 10.1088/1367-2630/10/1/013031. - DOI
    1. Cerf N.J., Lévy M., Assche G.V. Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A. 2001;63:052311. doi: 10.1103/PhysRevA.63.052311. - DOI

LinkOut - more resources