Loading [MathJax]/extensions/tex2jax.js

Full field implementation of a perfect eavesdropper on a quantum cryptography system

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Autorschaft

  • I. Gerhardt
  • Q. Liu
  • A. Lamas-Linares
  • J. Skaar

Organisationseinheiten

Details

OriginalspracheEnglisch
Seiten (von - bis)349
Seitenumfang1
FachzeitschriftNature Comm.
Jahrgang2
PublikationsstatusVeröffentlicht - 2011

Abstract

Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Many technological imperfections in QKD systems were explored, whereas no attack on an established QKD connection has been realized so far. Here we show the first full field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire `secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

Zitieren

Full field implementation of a perfect eavesdropper on a quantum cryptography system. / Gerhardt, I.; Liu, Q.; Lamas-Linares, A. et al.
in: Nature Comm., Jahrgang 2, 2011, S. 349.

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Gerhardt, I, Liu, Q, Lamas-Linares, A, Skaar, J, Kurtsiefer, C & Makarov, V 2011, 'Full field implementation of a perfect eavesdropper on a quantum cryptography system', Nature Comm., Jg. 2, S. 349. <http://www.nature.com/ncomms/journal/v2/n6/full/ncomms1348.html>
Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Kurtsiefer C, Makarov V. Full field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Comm. 2011;2:349.
Gerhardt, I. ; Liu, Q. ; Lamas-Linares, A. et al. / Full field implementation of a perfect eavesdropper on a quantum cryptography system. in: Nature Comm. 2011 ; Jahrgang 2. S. 349.
Download
@article{765b8ce15dbd4ab8aac26dd8a3e7763b,
title = "Full field implementation of a perfect eavesdropper on a quantum cryptography system",
abstract = "Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Many technological imperfections in QKD systems were explored, whereas no attack on an established QKD connection has been realized so far. Here we show the first full field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire `secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.",
keywords = "Quantum Key Distribution, Quantum Cryptogrpahy, QKD, Quantum Hacking, Single Photon Detectors",
author = "I. Gerhardt and Q. Liu and A. Lamas-Linares and J. Skaar and C. Kurtsiefer and V. Makarov",
year = "2011",
language = "English",
volume = "2",
pages = "349",

}

Download

TY - JOUR

T1 - Full field implementation of a perfect eavesdropper on a quantum cryptography system

AU - Gerhardt, I.

AU - Liu, Q.

AU - Lamas-Linares, A.

AU - Skaar, J.

AU - Kurtsiefer, C.

AU - Makarov, V.

PY - 2011

Y1 - 2011

N2 - Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Many technological imperfections in QKD systems were explored, whereas no attack on an established QKD connection has been realized so far. Here we show the first full field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire `secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

AB - Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Many technological imperfections in QKD systems were explored, whereas no attack on an established QKD connection has been realized so far. Here we show the first full field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire `secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

KW - Quantum Key Distribution

KW - Quantum Cryptogrpahy

KW - QKD

KW - Quantum Hacking

KW - Single Photon Detectors

M3 - Article

VL - 2

SP - 349

JO - Nature Comm.

JF - Nature Comm.

ER -

Von denselben Autoren