Affiliation:
1. Southern Federal University, Taganrog, Russia
Abstract
A typical structure of an auto-compensation system for quantum key distribution is given. The principle of operation of a fiber-optic system for the distribution of quantum keys with phase coding of photon states is described. The operation of the system in the synchronization mode and the formation of quantum keys was investigated. The process of detecting a time interval with an optical synchronization pulse is analyzed. The structural scheme of the experimental stand of the quantum-cryptographic network is given. Data are obtained that attest to the presence of a multiphoton signal during the transmission of sync pulses from the transceiver station to the coding and backward direction. The results of experimental studies are presented, which prove the existence of a vulnerability in the process of synchronization of the quantum key distribution system. It is shown that the use of a multiphoton optical pulse as a sync signal makes it possible for an attacker to unauthorized access to a quantum communication channel. The experimental results show that tapping a portion of the optical power from the quantum communication channel during the synchronization process allows an attacker to remain unnoticed while the quantum protocol is operating. Experimentally proved the possibility of introducing malfunctions into the operation of the quantum communication system at the stage of key formation, while remaining invisible for control means.
Reference26 articles.
1. Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv:1208.0403
2. Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes
3. Experimental quantum cryptography.;Bennett, C. H., Bessette, F., Brassard, G., Salvail, L., & Smolin, J.;Journal of Cryptology,1992
4. A novel approach to defend multimedia flash crowd in cloud environment.;K.Bhushan;Multimedia Tools and Applications,2018
5. Quantum cryptography beyond quantum key distribution.;A.Broadbent;Designs, Codes and Cryptography
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献