Trojan Horse attacks on Quantum Key Distribution systems

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

7 pages; refs added and a new paragraph on the reduction of the security analysis of 2-way quantum cryptography systems to the

Scientific paper

General Trojan horse attacks on quantum key distribution systems are analyzed. We illustrate the power of such attacks with today's technology and conclude that all system must implement active counter-measures. In particular all systems must include an auxiliary detector that monitors any incoming light. We show that such counter-measures can be efficient, provided enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan horse attacks. This does reduce the security analysis of the 2-way {\it Plug-&-Play} system to those of the standard 1-way systems.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Trojan Horse attacks on Quantum Key Distribution systems does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Trojan Horse attacks on Quantum Key Distribution systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trojan Horse attacks on Quantum Key Distribution systems will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-480938

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.