Experimental vulnerability analysis of QKD based on attack ratings
Abstract Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/bc914fa7037c441eac7cdef3e564b059 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:bc914fa7037c441eac7cdef3e564b059 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:bc914fa7037c441eac7cdef3e564b0592021-12-02T15:37:58ZExperimental vulnerability analysis of QKD based on attack ratings10.1038/s41598-021-87574-42045-2322https://doaj.org/article/bc914fa7037c441eac7cdef3e564b0592021-05-01T00:00:00Zhttps://doi.org/10.1038/s41598-021-87574-4https://doaj.org/toc/2045-2322Abstract Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two different attack strategies. The first strategy relies on inducing detector saturation by performing a large coherent displacement. This strategy is experimentally challenging and therefore translates into a high attack rating. We also propose and experimentally demonstrate a second attack strategy that simply consists in saturating the detector with an external laser. The low rating we obtain indicates that this attack constitutes a primary threat for practical CV-QKD systems. These results highlight the benefits of combining theoretical security considerations with vulnerability analysis based on attack ratings, in order to guide the design and engineering of practical QKD systems towards the highest possible security standards.Rupesh KumarFrancesco MazzonciniHao QinRomain AlléaumeNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 11, Iss 1, Pp 1-12 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q Rupesh Kumar Francesco Mazzoncini Hao Qin Romain Alléaume Experimental vulnerability analysis of QKD based on attack ratings |
description |
Abstract Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two different attack strategies. The first strategy relies on inducing detector saturation by performing a large coherent displacement. This strategy is experimentally challenging and therefore translates into a high attack rating. We also propose and experimentally demonstrate a second attack strategy that simply consists in saturating the detector with an external laser. The low rating we obtain indicates that this attack constitutes a primary threat for practical CV-QKD systems. These results highlight the benefits of combining theoretical security considerations with vulnerability analysis based on attack ratings, in order to guide the design and engineering of practical QKD systems towards the highest possible security standards. |
format |
article |
author |
Rupesh Kumar Francesco Mazzoncini Hao Qin Romain Alléaume |
author_facet |
Rupesh Kumar Francesco Mazzoncini Hao Qin Romain Alléaume |
author_sort |
Rupesh Kumar |
title |
Experimental vulnerability analysis of QKD based on attack ratings |
title_short |
Experimental vulnerability analysis of QKD based on attack ratings |
title_full |
Experimental vulnerability analysis of QKD based on attack ratings |
title_fullStr |
Experimental vulnerability analysis of QKD based on attack ratings |
title_full_unstemmed |
Experimental vulnerability analysis of QKD based on attack ratings |
title_sort |
experimental vulnerability analysis of qkd based on attack ratings |
publisher |
Nature Portfolio |
publishDate |
2021 |
url |
https://doaj.org/article/bc914fa7037c441eac7cdef3e564b059 |
work_keys_str_mv |
AT rupeshkumar experimentalvulnerabilityanalysisofqkdbasedonattackratings AT francescomazzoncini experimentalvulnerabilityanalysisofqkdbasedonattackratings AT haoqin experimentalvulnerabilityanalysisofqkdbasedonattackratings AT romainalleaume experimentalvulnerabilityanalysisofqkdbasedonattackratings |
_version_ |
1718386198180790272 |