Cargando…
Quantum man-in-the-middle attack on the calibration process of quantum key distribution
Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and lo...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5845025/ https://www.ncbi.nlm.nih.gov/pubmed/29523828 http://dx.doi.org/10.1038/s41598-018-22700-3 |
_version_ | 1783305342272143360 |
---|---|
author | Fei, Yang-Yang Meng, Xiang-Dong Gao, Ming Wang, Hong Ma, Zhi |
author_facet | Fei, Yang-Yang Meng, Xiang-Dong Gao, Ming Wang, Hong Ma, Zhi |
author_sort | Fei, Yang-Yang |
collection | PubMed |
description | Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process. |
format | Online Article Text |
id | pubmed-5845025 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-58450252018-03-14 Quantum man-in-the-middle attack on the calibration process of quantum key distribution Fei, Yang-Yang Meng, Xiang-Dong Gao, Ming Wang, Hong Ma, Zhi Sci Rep Article Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process. Nature Publishing Group UK 2018-03-09 /pmc/articles/PMC5845025/ /pubmed/29523828 http://dx.doi.org/10.1038/s41598-018-22700-3 Text en © The Author(s) 2018 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Fei, Yang-Yang Meng, Xiang-Dong Gao, Ming Wang, Hong Ma, Zhi Quantum man-in-the-middle attack on the calibration process of quantum key distribution |
title | Quantum man-in-the-middle attack on the calibration process of quantum key distribution |
title_full | Quantum man-in-the-middle attack on the calibration process of quantum key distribution |
title_fullStr | Quantum man-in-the-middle attack on the calibration process of quantum key distribution |
title_full_unstemmed | Quantum man-in-the-middle attack on the calibration process of quantum key distribution |
title_short | Quantum man-in-the-middle attack on the calibration process of quantum key distribution |
title_sort | quantum man-in-the-middle attack on the calibration process of quantum key distribution |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5845025/ https://www.ncbi.nlm.nih.gov/pubmed/29523828 http://dx.doi.org/10.1038/s41598-018-22700-3 |
work_keys_str_mv | AT feiyangyang quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution AT mengxiangdong quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution AT gaoming quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution AT wanghong quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution AT mazhi quantummaninthemiddleattackonthecalibrationprocessofquantumkeydistribution |