Cargando…

Quantum man-in-the-middle attack on the calibration process of quantum key distribution

Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and lo...

Descripción completa

Detalles Bibliográficos
Autores principales: Fei, Yang-Yang, Meng, Xiang-Dong, Gao, Ming, Wang, Hong, Ma, Zhi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5845025/
https://www.ncbi.nlm.nih.gov/pubmed/29523828
http://dx.doi.org/10.1038/s41598-018-22700-3
_version_ 1783305342272143360
author Fei, Yang-Yang
Meng, Xiang-Dong
Gao, Ming
Wang, Hong
Ma, Zhi
author_facet Fei, Yang-Yang
Meng, Xiang-Dong
Gao, Ming
Wang, Hong
Ma, Zhi
author_sort Fei, Yang-Yang
collection PubMed
description Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process.
format Online
Article
Text
id pubmed-5845025
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-58450252018-03-14 Quantum man-in-the-middle attack on the calibration process of quantum key distribution Fei, Yang-Yang Meng, Xiang-Dong Gao, Ming Wang, Hong Ma, Zhi Sci Rep Article Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process. Nature Publishing Group UK 2018-03-09 /pmc/articles/PMC5845025/ /pubmed/29523828 http://dx.doi.org/10.1038/s41598-018-22700-3 Text en © The Author(s) 2018 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Fei, Yang-Yang
Meng, Xiang-Dong
Gao, Ming
Wang, Hong
Ma, Zhi
Quantum man-in-the-middle attack on the calibration process of quantum key distribution
title Quantum man-in-the-middle attack on the calibration process of quantum key distribution
title_full Quantum man-in-the-middle attack on the calibration process of quantum key distribution
title_fullStr Quantum man-in-the-middle attack on the calibration process of quantum key distribution
title_full_unstemmed Quantum man-in-the-middle attack on the calibration process of quantum key distribution
title_short Quantum man-in-the-middle attack on the calibration process of quantum key distribution
title_sort quantum man-in-the-middle attack on the calibration process of quantum key distribution
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5845025/
https://www.ncbi.nlm.nih.gov/pubmed/29523828
http://dx.doi.org/10.1038/s41598-018-22700-3
work_keys_str_mv AT feiyangyang quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution
AT mengxiangdong quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution
AT gaoming quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution
AT wanghong quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution
AT mazhi quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution