Physics – Quantum Physics
Scientific paper
2005-07-06
Physics
Quantum Physics
7 pages; refs added and a new paragraph on the reduction of the security analysis of 2-way quantum cryptography systems to the
Scientific paper
General Trojan horse attacks on quantum key distribution systems are analyzed. We illustrate the power of such attacks with today's technology and conclude that all system must implement active counter-measures. In particular all systems must include an auxiliary detector that monitors any incoming light. We show that such counter-measures can be efficient, provided enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan horse attacks. This does reduce the security analysis of the 2-way {\it Plug-&-Play} system to those of the standard 1-way systems.
Fasel Sylvain
Gisin Nicolas
Kraus Barbara
Ribordy Gregoire
Zbinden Hugo
No associations
LandOfFree
Trojan Horse attacks on Quantum Key Distribution systems does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Trojan Horse attacks on Quantum Key Distribution systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trojan Horse attacks on Quantum Key Distribution systems will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-480938