Detector blinding attacks on quantum cryptography defeated

Dec 01, 2010

(PhysOrg.com) -- The Cambridge Research Laboratory of Toshiba Research Europe announced today that it has discovered a simple method to prevent detector blinding attacks on quantum cryptography.

Quantum cryptography is a method to distribute digital encryption keys across an optical fibre. The protocol has been proven to be perfectly secure from eavesdropping. However, any differences between the theoretical protocol and its real-world implementation can be exploited to compromise the security of specific systems.

A recent paper published in the September edition of suggests a method to blind the Indium Gallium Arsenide (InGaAs) avalanche photo-detectors that are commonly used in quantum cryptography. If successful, this attack could allow an eavesdropper to gain information about the secret key.

Now an investigation by the Cambridge team, to be published in the December edition of Nature Photonics, demonstrates that the detector blinding attack is completely ineffective, provided that the single photon detectors are operated correctly.

The new study shows that the attack is only successful if a redundant resistor is included in series with the single , or if the discrimination levels are set inappropriately. Furthermore, by monitoring the photocurrent generated by the detector it is possible to prevent all bright light attacks on avalanche photodiodes.

Dr Andrew Shields, Assistant Managing Director, Toshiba Research Europe, comments, “Quantum cryptography is now entering a new phase in which the security of particular implementations is carefully analysed and tested. This is important to uncover any security loopholes and to devise appropriate countermeasures. It will allow real-world devices to approach the perfect security that can be proven for the protocol.”

Toshiba recently implemented its quantum key distribution (QKD) technology in the network set up in the Tokyo metropolitan area in October 2010. In a series of trials Toshiba demonstrated record average secure bit rates on installed fibre in the network. A secure bit rate of 304 kb/s was demonstrated, averaged over a 24 hour period, on a 45km fibre despite a relatively high loss on the link of 14.5dB. In April 2010 the same team announced an average secure bit rate of 1 Mb/s for a laboratory based demonstration on a 50 km fibre spool.

Explore further: New method to achieve ultra-narrow laser linewidth

More information: For further information about the work of Toshiba’s Cambridge Research Laboratory in Quantum Information Technology, go to www.toshiba-europe.com/research/crl/qig/index.html

Related Stories

Making quantum cryptography practical

Apr 30, 2009

Quantum cryptography, a completely secure means of communication, is much closer to being used practically as researchers from Toshiba and Cambridge University's Cavendish Laboratory have now developed high speed detectors ...

Vulnerability in commercial quantum cryptography

Aug 29, 2010

The Norwegian University of Science and Technology (NTNU) and the University of Erlangen-Nurnberg together with the Max Planck Institute for the Science of Light in Erlangen have recently developed and tested ...

'Dead time' limits quantum cryptography speeds

Sep 28, 2007

Quantum cryptography is potentially the most secure method of sending encrypted information, but does it have a speed limit" According to a new paper by researchers at the National Institute of Standards and Technology and ...

Recommended for you

Giving LEDs a cozy, warm glow

Nov 19, 2014

When the 2014 Nobel Prize in physics was awarded this October to three Japanese-born scientists for the invention of blue light emitting diodes (LEDs), the prize committee declared LED lamps would light the ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.