中国物理B ›› 2016, Vol. 25 ›› Issue (8): 80309-080309.doi: 10.1088/1674-1056/25/8/080309

• GENERAL • 上一篇    下一篇

Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

Hong-Xin Ma(马鸿鑫), Wan-Su Bao(鲍皖苏), Hong-Wei Li(李宏伟), Chun Chou(周淳)   

  1. 1 PLA Information Engineering University, Zhengzhou 450001, China;
    2 Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
  • 收稿日期:2016-02-12 修回日期:2016-04-19 出版日期:2016-08-05 发布日期:2016-08-05
  • 通讯作者: Wan-Su Bao E-mail:2010thzz@sina.com
  • 基金资助:

    Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

Hong-Xin Ma(马鸿鑫)1,2, Wan-Su Bao(鲍皖苏)1,2, Hong-Wei Li(李宏伟)1,2, Chun Chou(周淳)1,2   

  1. 1 PLA Information Engineering University, Zhengzhou 450001, China;
    2 Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
  • Received:2016-02-12 Revised:2016-04-19 Online:2016-08-05 Published:2016-08-05
  • Contact: Wan-Su Bao E-mail:2010thzz@sina.com
  • Supported by:

    Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).

摘要:

We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.

关键词: quantum hacking, two-way, continuous-variable, quantum key distribution, Trojan-horse

Abstract:

We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.

Key words: quantum hacking, two-way, continuous-variable, quantum key distribution, Trojan-horse

中图分类号:  (Quantum communication)

  • 03.67.Hk
03.67.-a (Quantum information) 03.67.Dd (Quantum cryptography and communication security)