首页> 美国卫生研究院文献>Scientific Reports >Invisible Trojan-horse attack
【2h】

Invisible Trojan-horse attack

机译:隐形特洛伊木马攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.
机译:我们证明了特洛伊木马攻击的实验可行性,对于实际的量子密钥分发(QKD)系统中使用的单光子检测器,如ID Quantique的Clavis2,它几乎几乎是看不见的。我们对Scarani-Ac´ın-Ribordy-Gisin(SARG04)QKD协议在1924 nm和1536 nm的攻击性能进行了详细的数值比较。如N.Jain等人在《新物理学报》(New J.Phys。 16,123030(2014)。但是,在1924 nm处,我们通过实验证明了探测器对亮脉冲的噪声响应大大降低,并且通过建模表明相同的攻击将成功。如果不采取适当的对策,攻击的隐形性质将对实际QKD的安全性构成威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号