Cargando…

Quantum key distribution with hacking countermeasures and long term field trial

Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and...

Descripción completa

Detalles Bibliográficos
Autores principales: Dixon, A. R., Dynes, J. F., Lucamarini, M., Fröhlich, B., Sharpe, A. W., Plews, A., Tam, W., Yuan, Z. L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., Shields, A. J.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5434053/
https://www.ncbi.nlm.nih.gov/pubmed/28512308
http://dx.doi.org/10.1038/s41598-017-01884-0
_version_ 1783236966445219840
author Dixon, A. R.
Dynes, J. F.
Lucamarini, M.
Fröhlich, B.
Sharpe, A. W.
Plews, A.
Tam, W.
Yuan, Z. L.
Tanizawa, Y.
Sato, H.
Kawamura, S.
Fujiwara, M.
Sasaki, M.
Shields, A. J.
author_facet Dixon, A. R.
Dynes, J. F.
Lucamarini, M.
Fröhlich, B.
Sharpe, A. W.
Plews, A.
Tam, W.
Yuan, Z. L.
Tanizawa, Y.
Sato, H.
Kawamura, S.
Fujiwara, M.
Sasaki, M.
Shields, A. J.
author_sort Dixon, A. R.
collection PubMed
description Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
format Online
Article
Text
id pubmed-5434053
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-54340532017-05-17 Quantum key distribution with hacking countermeasures and long term field trial Dixon, A. R. Dynes, J. F. Lucamarini, M. Fröhlich, B. Sharpe, A. W. Plews, A. Tam, W. Yuan, Z. L. Tanizawa, Y. Sato, H. Kawamura, S. Fujiwara, M. Sasaki, M. Shields, A. J. Sci Rep Article Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered. Nature Publishing Group UK 2017-05-16 /pmc/articles/PMC5434053/ /pubmed/28512308 http://dx.doi.org/10.1038/s41598-017-01884-0 Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Dixon, A. R.
Dynes, J. F.
Lucamarini, M.
Fröhlich, B.
Sharpe, A. W.
Plews, A.
Tam, W.
Yuan, Z. L.
Tanizawa, Y.
Sato, H.
Kawamura, S.
Fujiwara, M.
Sasaki, M.
Shields, A. J.
Quantum key distribution with hacking countermeasures and long term field trial
title Quantum key distribution with hacking countermeasures and long term field trial
title_full Quantum key distribution with hacking countermeasures and long term field trial
title_fullStr Quantum key distribution with hacking countermeasures and long term field trial
title_full_unstemmed Quantum key distribution with hacking countermeasures and long term field trial
title_short Quantum key distribution with hacking countermeasures and long term field trial
title_sort quantum key distribution with hacking countermeasures and long term field trial
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5434053/
https://www.ncbi.nlm.nih.gov/pubmed/28512308
http://dx.doi.org/10.1038/s41598-017-01884-0
work_keys_str_mv AT dixonar quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT dynesjf quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT lucamarinim quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT frohlichb quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT sharpeaw quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT plewsa quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT tamw quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT yuanzl quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT tanizaway quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT satoh quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT kawamuras quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT fujiwaram quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT sasakim quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT shieldsaj quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial