Author:
Sajeed Shihan,Chaiwongkhot Poompong,Huang Anqi,Qin Hao,Egorov Vladimir,Kozubov Anton,Gaidash Andrei,Chistiakov Vladimir,Vasiliev Artur,Gleim Artur,Makarov Vadim
Abstract
AbstractAlthough quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.
Publisher
Springer Science and Business Media LLC
Reference92 articles.
1. Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of International Conference on Computers, Systems, and Signal Processing, 175–179 (IEEE Press, New York, Bangalore, India, 1984).
2. Yin, J. et al. Satellite-based entanglement distribution over 1200 kilometers. Science 356, 1140. https://doi.org/10.1126/science.aan3211 (2017).
3. Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686–689. https://doi.org/10.1038/nphoton.2010.214 (2010).
4. Xu, F., Qi, B. & Lo, H.-K. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026. https://doi.org/10.1088/1367-2630/12/11/113026 (2010).
5. Sun, S.-H., Jiang, M.-S. & Liang, L.-M. Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system. Phys. Rev. A 83, 062331. https://doi.org/10.1103/PhysRevA.83.062331 (2011).
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献