首页> 外文OA文献 >Detection Efficiency Mismatch and Finite-Key-Size Attacks on Practical Quantum Cryptography Systems
【2h】

Detection Efficiency Mismatch and Finite-Key-Size Attacks on Practical Quantum Cryptography Systems

机译:实用量子密码系统上的检测效率不匹配和有限密钥攻击

摘要

Security verification for the physical implementation of a cryptography system is an important step to ensure the security level promised by theory. As has been shown many times, any physical device has characteristics and behavior that deviate from theoretical expectations. Frequently, those lead to new security loopholes. This thesis presents three experimental studies of attacks on quantum key distribution (QKD) systems. The first is the detection efficiency mismatch on free-space systems, which takes advantage of alignment imperfections in Bob's detector to control detection efficiencies. The experiment was done on a polarization-encoding free-space receiver to find the detection efficiencies of each detector for different spatial modes of an incoming photon. Those results were put into an optimization program, which modeled an intercept-and-resend attack on a non-decoy Bennett-Brassard 1984 (BB84) protocol. The result shows that an adversary is able to gain information about the key without being detected by Alice and Bob. The second study is an experimental test of reliability of a spatial filter (a pinhole), which is proposed as a countermeasure for the previous attack. The result shows that, by sending a high-power laser beam focused on the pinhole, the pinhole can be widened without affecting other components in the receiver. Thus, the ability to perform a spatial mode detection efficiency-mismatch attack is recovered. The last experiment is a demonstration of Eve's ability to force a commercial system to distill a key from a raw key of a short length, where the asymptotic assumption of security claimed by the manufacturer might not hold. It was shown that this could be done by inducing transmission loss in the channel at an appropriate time.
机译:密码系统物理实施的安全验证是确保理论上保证的安全级别的重要步骤。正如许多次所表明的那样,任何物理设备都具有与理论预期不同的特征和行为。通常,这些会导致新的安全漏洞。本文提出了对量子密钥分发(QKD)系统进行攻击的三项实验研究。第一个是自由空间系统上的检测效率失配,它利用Bob检波器中的对准缺陷来控制检测效率。该实验是在偏振编码自由空间接收器上完成的,目的是找出每个检测器对入射光子不同空间模式的检测效率。将这些结果放入优化程序,该程序对非诱饵Bennett-Brassard 1984(BB84)协议的拦截和重新发送攻击进行了建模。结果表明,对手可以获取有关密钥的信息,而不会被爱丽丝和鲍勃检测到。第二项研究是对空间过滤器(针孔)的可靠性进行的实验测试,被提议作为先前攻击的对策。结果表明,通过将高功率激光束聚焦在针孔上,可以扩大针孔,而不会影响接收器中的其他组件。因此,恢复了执行空间模式检测效率不匹配攻击的能力。最后一个实验证明了Eve能够迫使商业系统从短长度的原始密钥中提取密钥的能力,在这种情况下,制造商声称的安全性渐近假设可能不成立。已经表明,这可以通过在适当的时间在信道中引起传输损耗来实现。

著录项

  • 作者

    Chaiwongkhot Poompong;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号