SlideShare a Scribd company logo
Quantum Cryptography
Ranveer Raaj Joyseeree & Andreas Fognini
Alice
Bob
Eve
Classical Algorithms
1. Asymmetrical (public-key) cryptosystems:
- First implementationnn RSA (Ronald Rivest, Adi Shamir, and Leonard Adleman) 1978
- Very convenient, Internet
- Idea is based on computational complexity f(x) = y, x = ?.
- rely on unproven assumptions
Private Public
Message
Message Encrypted message
Classical Algorithms
Classical Algorithms
2. Symmetrical (secret-key) cryptosystems:
- only provably secure cryptosystem known today
- not handy, key as long as message
- key only valid for one transmission
- how to send the key in a secure manner?
M: 1 0 1 0 1 0 1 0
K: 1 0 0 0 1 1 1 0
S: 0 0 1 0 0 1 0 0
Distribute key over secure channel
M
M S
S: 0 0 1 0 0 1 0 0
K: 1 0 0 0 1 1 1 0
M: 1 0 1 0 1 0 1 0
XOR XOR
Quantum Cryptography: The BB84 Portocol
Ingredients: 1) One photon no copying,
2) Two non orthonormal bases sets
3) Insecure classical channel; Internet
What it does: Secure distribution of a key, can't be used to send messages
How it works:
50% correlated
Physikalische Blätter 55, 25 (1999)
Copy machine: e.g.
Eve's copy machine
50% decrease
in correlation!
Alice and Bob recognize
attack from error rate!
Conclusion
 Quantum cryptography means just the
exchange of keys
 Actual transmission of data is done with
classical algorithms
 Alice & Bob can find out when Eve tries to
eavesdrop.
Hacking Quantum Key Distribution systems
 QKD systems promise enhanced security.
 In fact, quantum cryptography is proveably
secure.
 Surely one cannot eavesdrop on such systems,
right?
Hacking QKD systems
 Security is easy to prove while assuming
perfect apparatus and a noise-free channel.
 Those assumptions are not valid for practical
systems e.g. Clavis2 from ID Quantique and
QPN 5505 from MagiQ Technologies.
 Vulnerabilities thus appear.
Hacking by tailored illumination
 Lydersen et al. (2010) proposed a method to
eavesdrop on a QKD system undetected.
 The hack exploits a vulnerability associated with
the avalanche photo diodes (APD‘s) used to
detect photons.
Avalanche photo diodes
 Can detect single photons when properly set.
 However, they are sensitive to more than just
quantum states.
Modes of operation of APD’s
 Geiger and linear modes
Geiger mode
 VAPD is usually fixed and called bias voltage and in Geiger mode, Vbias > Vbr.
 An incident photon creates an electron-hole pair, leading to an avalanche of carriers
and a surge of current IAPD beyond Ith. That is detected as a click.
 Vbias is then made smaller than Vbr to stop flow of carriers. Subsequently it is restored
to its original value in preparation for the next photon.
Linear mode
 Vbias < Vbr.
 Detected current is proportional to incident optical power Popt.
 Clicks again occur when IAPD > Ith.
Operation in practical QKD systems
 Vbias is varied as shown such that APD is in Geiger mode only
when a photon is expected
 That is to minimize false detections due to thermal fluctuations.
 However, it is still sensitive to bright light in linear mode.
The hack in detail
 Eve uses an intercept-resend attack.
 She uses a copy of Bob to detect states in a random basis.
 Sends her results to Bob as bright light pulses, with peak power
> Pth, instead of individual photons.
 She also blinds Bob‘s APD‘s to make them operate as classical
photodiodes only at all times to improve QBER.
The hack in detail
 C is a 50:50 coupler used in phase-encoded QKD systems.
 When Eve‘s and Bob‘s bases match, trigger pulse from Eve constructively interferes
and hits detector corresponding to what Eve detected.
 Otherwise, no constructive interference and both detectors hit with equal energy.
 Click only observed if detected current > Ith.
The hack in detail
 Clicks also only observed when Eve and Bob have
matching bases.
 This means Eve and Bob now have identical bit values
and basis choices, independently of photons emitted
by Alice.
 However, half the bits are lost in the process of
eavesdropping.
Performance issues?
 Usually, transmittance from Alice to Bob < 50%.
 APDs have a quantum efficiency < 50%.
 However, trigger pulses cause clicks in all cases.
 Loss of bits is thus compensated for and Eve stays
undetected
Other methods
 Method presented is not the only known exploit.
 Zhao et al. (2008) attempted a time-shift attack.
 Xu et al. (2010) attempted a phase remapping attack.
Conclusion
 QKD systems are unconditionally secure, based on
the fundamental laws of physics.
 However, physical realisations of those systems
violate some of the assumptions of the security proof.
 Eavesdroppers may thus intercept sent messages
without being detected.
 Rev Mod Phys 74, 145 (2002)
 Physikalische Blätter 55, 25 (1999)
 Nature Photonics 4, 686 (2010)
 Experimental demonstration of phase-remapping attack in a
practical quantum key distribution system. Xu et al. (2010)
 Hacking commercial quantum cryptography systems by tailored
bright illumination. Lydersen et al. (2010)
 Quantum hacking: Experimental demonstration of time-shift
attack against practical quantum-key-distribution systems. Zhao
et al. (2008).
Used Material

More Related Content

Similar to QSIT-QuantumCryptography.ppt

Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
ranjan954354
 
Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
ssuser3feafb
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
SuriaRao2
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
IRJET Journal
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
ijcisjournal
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
ijcisjournal
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Anisur Rahman
 
Continuous variables quantum cryptography
Continuous variables quantum cryptographyContinuous variables quantum cryptography
Continuous variables quantum cryptography
wtyru1989
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
XequeMateShannon
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
sahilnarvekar
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
Francisco J. Gálvez Ramírez
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Sukhdeep Kaur
 
Ieee lecture
Ieee lectureIeee lecture
Ieee lecture
Julie Samal
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
IJNSA Journal
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
Prasanna Venkatesan
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
Anand Kairamkonda
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
Information Security Awareness Group
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum Computing
Tim Ellison
 

Similar to QSIT-QuantumCryptography.ppt (20)

Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
 
Presentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.pptPresentation_CERN_03-05-06.ppt
Presentation_CERN_03-05-06.ppt
 
quantum cryptography introduction for understanding
quantum cryptography introduction for understandingquantum cryptography introduction for understanding
quantum cryptography introduction for understanding
 
IRJET- Quantum Key Distribution
IRJET-  	  Quantum Key DistributionIRJET-  	  Quantum Key Distribution
IRJET- Quantum Key Distribution
 
Cryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical ViewpointCryptography from Quantum Mechanical Viewpoint
Cryptography from Quantum Mechanical Viewpoint
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Continuous variables quantum cryptography
Continuous variables quantum cryptographyContinuous variables quantum cryptography
Continuous variables quantum cryptography
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Quantum Cryptography: from Theory to Practice
 Quantum Cryptography: from Theory to Practice Quantum Cryptography: from Theory to Practice
Quantum Cryptography: from Theory to Practice
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Ieee lecture
Ieee lectureIeee lecture
Ieee lecture
 
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction...
 
Quantum Information
Quantum InformationQuantum Information
Quantum Information
 
Introduction to quantum cryptography
Introduction to quantum cryptographyIntroduction to quantum cryptography
Introduction to quantum cryptography
 
Janusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptographyJanusz Kowalik: quantum cryptography
Janusz Kowalik: quantum cryptography
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum Computing
 

Recently uploaded

Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
Madan Karki
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 

Recently uploaded (20)

Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
john krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptxjohn krisinger-the science and history of the alcoholic beverage.pptx
john krisinger-the science and history of the alcoholic beverage.pptx
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 

QSIT-QuantumCryptography.ppt

  • 1. Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve
  • 2. Classical Algorithms 1. Asymmetrical (public-key) cryptosystems: - First implementationnn RSA (Ronald Rivest, Adi Shamir, and Leonard Adleman) 1978 - Very convenient, Internet - Idea is based on computational complexity f(x) = y, x = ?. - rely on unproven assumptions Private Public Message Message Encrypted message
  • 3. Classical Algorithms Classical Algorithms 2. Symmetrical (secret-key) cryptosystems: - only provably secure cryptosystem known today - not handy, key as long as message - key only valid for one transmission - how to send the key in a secure manner? M: 1 0 1 0 1 0 1 0 K: 1 0 0 0 1 1 1 0 S: 0 0 1 0 0 1 0 0 Distribute key over secure channel M M S S: 0 0 1 0 0 1 0 0 K: 1 0 0 0 1 1 1 0 M: 1 0 1 0 1 0 1 0 XOR XOR
  • 4. Quantum Cryptography: The BB84 Portocol Ingredients: 1) One photon no copying, 2) Two non orthonormal bases sets 3) Insecure classical channel; Internet What it does: Secure distribution of a key, can't be used to send messages How it works: 50% correlated Physikalische Blätter 55, 25 (1999)
  • 5. Copy machine: e.g. Eve's copy machine 50% decrease in correlation! Alice and Bob recognize attack from error rate!
  • 6. Conclusion  Quantum cryptography means just the exchange of keys  Actual transmission of data is done with classical algorithms  Alice & Bob can find out when Eve tries to eavesdrop.
  • 7. Hacking Quantum Key Distribution systems  QKD systems promise enhanced security.  In fact, quantum cryptography is proveably secure.  Surely one cannot eavesdrop on such systems, right?
  • 8. Hacking QKD systems  Security is easy to prove while assuming perfect apparatus and a noise-free channel.  Those assumptions are not valid for practical systems e.g. Clavis2 from ID Quantique and QPN 5505 from MagiQ Technologies.  Vulnerabilities thus appear.
  • 9. Hacking by tailored illumination  Lydersen et al. (2010) proposed a method to eavesdrop on a QKD system undetected.  The hack exploits a vulnerability associated with the avalanche photo diodes (APD‘s) used to detect photons.
  • 10. Avalanche photo diodes  Can detect single photons when properly set.  However, they are sensitive to more than just quantum states.
  • 11. Modes of operation of APD’s  Geiger and linear modes
  • 12. Geiger mode  VAPD is usually fixed and called bias voltage and in Geiger mode, Vbias > Vbr.  An incident photon creates an electron-hole pair, leading to an avalanche of carriers and a surge of current IAPD beyond Ith. That is detected as a click.  Vbias is then made smaller than Vbr to stop flow of carriers. Subsequently it is restored to its original value in preparation for the next photon.
  • 13. Linear mode  Vbias < Vbr.  Detected current is proportional to incident optical power Popt.  Clicks again occur when IAPD > Ith.
  • 14. Operation in practical QKD systems  Vbias is varied as shown such that APD is in Geiger mode only when a photon is expected  That is to minimize false detections due to thermal fluctuations.  However, it is still sensitive to bright light in linear mode.
  • 15. The hack in detail  Eve uses an intercept-resend attack.  She uses a copy of Bob to detect states in a random basis.  Sends her results to Bob as bright light pulses, with peak power > Pth, instead of individual photons.  She also blinds Bob‘s APD‘s to make them operate as classical photodiodes only at all times to improve QBER.
  • 16. The hack in detail  C is a 50:50 coupler used in phase-encoded QKD systems.  When Eve‘s and Bob‘s bases match, trigger pulse from Eve constructively interferes and hits detector corresponding to what Eve detected.  Otherwise, no constructive interference and both detectors hit with equal energy.  Click only observed if detected current > Ith.
  • 17. The hack in detail  Clicks also only observed when Eve and Bob have matching bases.  This means Eve and Bob now have identical bit values and basis choices, independently of photons emitted by Alice.  However, half the bits are lost in the process of eavesdropping.
  • 18. Performance issues?  Usually, transmittance from Alice to Bob < 50%.  APDs have a quantum efficiency < 50%.  However, trigger pulses cause clicks in all cases.  Loss of bits is thus compensated for and Eve stays undetected
  • 19. Other methods  Method presented is not the only known exploit.  Zhao et al. (2008) attempted a time-shift attack.  Xu et al. (2010) attempted a phase remapping attack.
  • 20. Conclusion  QKD systems are unconditionally secure, based on the fundamental laws of physics.  However, physical realisations of those systems violate some of the assumptions of the security proof.  Eavesdroppers may thus intercept sent messages without being detected.
  • 21.  Rev Mod Phys 74, 145 (2002)  Physikalische Blätter 55, 25 (1999)  Nature Photonics 4, 686 (2010)  Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. Xu et al. (2010)  Hacking commercial quantum cryptography systems by tailored bright illumination. Lydersen et al. (2010)  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Zhao et al. (2008). Used Material