Reference Hub17
Vulnerability of the Synchronization Process in the Quantum Key Distribution System

Vulnerability of the Synchronization Process in the Quantum Key Distribution System

A. P. Pljonkin
Copyright: © 2019 |Volume: 9 |Issue: 1 |Pages: 9
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522567769|DOI: 10.4018/IJCAC.2019010104
Cite Article Cite Article

MLA

Pljonkin, A. P. "Vulnerability of the Synchronization Process in the Quantum Key Distribution System." IJCAC vol.9, no.1 2019: pp.50-58. http://doi.org/10.4018/IJCAC.2019010104

APA

Pljonkin, A. P. (2019). Vulnerability of the Synchronization Process in the Quantum Key Distribution System. International Journal of Cloud Applications and Computing (IJCAC), 9(1), 50-58. http://doi.org/10.4018/IJCAC.2019010104

Chicago

Pljonkin, A. P. "Vulnerability of the Synchronization Process in the Quantum Key Distribution System," International Journal of Cloud Applications and Computing (IJCAC) 9, no.1: 50-58. http://doi.org/10.4018/IJCAC.2019010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A typical structure of an auto-compensation system for quantum key distribution is given. The principle of operation of a fiber-optic system for the distribution of quantum keys with phase coding of photon states is described. The operation of the system in the synchronization mode and the formation of quantum keys was investigated. The process of detecting a time interval with an optical synchronization pulse is analyzed. The structural scheme of the experimental stand of the quantum-cryptographic network is given. Data are obtained that attest to the presence of a multiphoton signal during the transmission of sync pulses from the transceiver station to the coding and backward direction. The results of experimental studies are presented, which prove the existence of a vulnerability in the process of synchronization of the quantum key distribution system. It is shown that the use of a multiphoton optical pulse as a sync signal makes it possible for an attacker to unauthorized access to a quantum communication channel. The experimental results show that tapping a portion of the optical power from the quantum communication channel during the synchronization process allows an attacker to remain unnoticed while the quantum protocol is operating. Experimentally proved the possibility of introducing malfunctions into the operation of the quantum communication system at the stage of key formation, while remaining invisible for control means.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.