Trojan-horse attacks threaten the security of practical quantum cryptography
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 49 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/38696 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
16
00:00
Heat exchangerModel buildingElectric power distributionWriting implementSynthesizerQuantumKey (engineering)LeadMint-made errorsEveningPlain bearingVideoElectric power distributionSynthesizerQuantum cryptographyComputer animationLecture/ConferenceMeeting/Interview
01:03
SynthesizerQuantumMeeting/Interview
01:28
LightReflexionskoeffizientSynthesizerBasis (linear algebra)EveningChannelingA Large Ion Collider ExperimentComputer animationDiagram
01:46
ModulationRefractive indexLichtleitkabelMultiplizitätSteckverbinderLecture/Conference
02:07
ModulationOpticsReflexionskoeffizientBasis (linear algebra)Binary starLaserModulationPhotonTypesettingChannelingSingle (music)HalbleitergleichrichterAvalancheSynthesizerQuantumSource (album)Interlaced videoPhase (matter)Basis (linear algebra)Diffuser (automotive)Domäne <Kristallographie>A Large Ion Collider ExperimentComputer animation
02:26
MeasurementEveningPhase (matter)SpantComputer animation
02:38
SensorPhotonSingle (music)AvalancheCartridge (firearms)EveningMeeting/Interview
02:46
BrightnessNoise (electronics)SynthesizerMint-made errorsPhotonHalbleitergleichrichterAvalancheGate (airport)EveningComputer animationDiagram
03:02
Rail transport operationsSensorNoise (electronics)SynthesizerTiefdruckgebietEveningPaperMeeting/Interview
03:33
TypesettingHot workingSynthesizerShip classMeeting/Interview
Transcript: English(auto-generated)
00:03
Hi there. Quantum key distribution or QKD provides methods to facilitate the exchange of a symmetric key which can be used for encrypting messages securely. The security of the distributed key is based on quantum mechanical principles. Essentially, the actions
00:21
of an adversary, usually called Eve, lead to an error in the outcomes observed by users, usually called Alice and Bob. But in practice, Eve's attack on a physical QKD implementation may go unnoticed because of imperfections in the hardware or insufficient assumptions in the theoretical security model. Today, I shall talk about Trojan Horse attacks
00:44
that can violate the security of practical QKD systems as we have recently demonstrated. Here you see the physical hardware of the QKD system on which we performed our demonstration. This system is known as Clavis II and it is sold by the Swiss firm Edi Quantique.
01:06
The objective of our exercise, frequently called quantum hacking, is to explore, expose and exploit vulnerabilities in practical QKD systems in an ethical manner. Here we cooperate with Edi Quantique and suggest them countermeasures against the crafted attacks.
01:23
The intention is to strengthen the security of practical QKD even further. The basic principle of Trojan Horse attacks involves the adversary Eve sending in bright light from the quantum channel and analyzing the back reflections. By measuring the back reflected photons, Eve can discern the secret basis choice of the attack subsystem.
01:46
Let us imagine a simple network composed of a modulator and an optical fiber. An optical pulse traveling through this network encounters multiple sites of back reflections, for example caused by a change of refractive index. Here these sites are located inside
02:03
the modulator and at the connector interface. This is the scheme of the QKD subsystem in which we found suitable back reflections using optical time domain reflectometry methods. We demonstrated that the secret basis choice in Bob can be discerned in real time with almost
02:24
100% success probability. In this graph, the red trace shows the random binary modulation of Bob and the blue trace the measurement outcomes of Eve. One can see they are highly correlated. It would therefore seem that the QKD system is hacked, but unfortunately for Eve that is not
02:44
the case. The single photon detectors in Bob are gated avalanche diodes that experience after pulsing due to the bright Trojan Horse pulses. This increases the overall noise and hence the error observed by Bob, thereby disclosing the attack.
03:03
We therefore developed an attack strategy that allows Eve to maximize the information of the secret key while minimizing the chances of being discovered. We simulated the operation of the QKD system with and without the attack, the details of which
03:20
you can find in our paper. Although our attack strategy does not succeed in Clevis 2, we show that similar QKD systems with low noise detectors may be hacked. Our attack setup and strategy can be easily generalized to other types of QKD systems. Also, the countermeasures against this attack are not entirely straightforward.
03:44
We discussed some in the paper and present a more comprehensive risk analysis in another related work. In conclusion, we have shown that neither the Trojan Horse attack nor the countermeasures against it are straightforward. However, with the insights gained from our work,
04:02
future QKD systems can be made safer against this class of attacks. Thank you for listening.
Recommendations
Series of 13 media