Trojan-horse attacks on quantum-key-distribution systems

N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy
Phys. Rev. A 73, 022320 – Published 13 February 2006

Abstract

General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
1 More
  • Received 26 July 2005

DOI:https://doi.org/10.1103/PhysRevA.73.022320

©2006 American Physical Society

Authors & Affiliations

N. Gisin1, S. Fasel1, B. Kraus1, H. Zbinden1, and G. Ribordy2

  • 1Group of Applied Physics, University of Geneva, 1211 Geneva 4, Switzerland
  • 2id Quantique SA, 3 Ch. de la Marbrerie, 1227 Carouge/Geneva, Switzerland

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 73, Iss. 2 — February 2006

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×