Experimental vulnerability analysis of QKD based on attack ratings

Abstract Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Rupesh Kumar, Francesco Mazzoncini, Hao Qin, Romain Alléaume
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2021
Materias:
R
Q
Acceso en línea:https://doaj.org/article/bc914fa7037c441eac7cdef3e564b059
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:bc914fa7037c441eac7cdef3e564b059
record_format dspace
spelling oai:doaj.org-article:bc914fa7037c441eac7cdef3e564b0592021-12-02T15:37:58ZExperimental vulnerability analysis of QKD based on attack ratings10.1038/s41598-021-87574-42045-2322https://doaj.org/article/bc914fa7037c441eac7cdef3e564b0592021-05-01T00:00:00Zhttps://doi.org/10.1038/s41598-021-87574-4https://doaj.org/toc/2045-2322Abstract Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two different attack strategies. The first strategy relies on inducing detector saturation by performing a large coherent displacement. This strategy is experimentally challenging and therefore translates into a high attack rating. We also propose and experimentally demonstrate a second attack strategy that simply consists in saturating the detector with an external laser. The low rating we obtain indicates that this attack constitutes a primary threat for practical CV-QKD systems. These results highlight the benefits of combining theoretical security considerations with vulnerability analysis based on attack ratings, in order to guide the design and engineering of practical QKD systems towards the highest possible security standards.Rupesh KumarFrancesco MazzonciniHao QinRomain AlléaumeNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 11, Iss 1, Pp 1-12 (2021)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Rupesh Kumar
Francesco Mazzoncini
Hao Qin
Romain Alléaume
Experimental vulnerability analysis of QKD based on attack ratings
description Abstract Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two different attack strategies. The first strategy relies on inducing detector saturation by performing a large coherent displacement. This strategy is experimentally challenging and therefore translates into a high attack rating. We also propose and experimentally demonstrate a second attack strategy that simply consists in saturating the detector with an external laser. The low rating we obtain indicates that this attack constitutes a primary threat for practical CV-QKD systems. These results highlight the benefits of combining theoretical security considerations with vulnerability analysis based on attack ratings, in order to guide the design and engineering of practical QKD systems towards the highest possible security standards.
format article
author Rupesh Kumar
Francesco Mazzoncini
Hao Qin
Romain Alléaume
author_facet Rupesh Kumar
Francesco Mazzoncini
Hao Qin
Romain Alléaume
author_sort Rupesh Kumar
title Experimental vulnerability analysis of QKD based on attack ratings
title_short Experimental vulnerability analysis of QKD based on attack ratings
title_full Experimental vulnerability analysis of QKD based on attack ratings
title_fullStr Experimental vulnerability analysis of QKD based on attack ratings
title_full_unstemmed Experimental vulnerability analysis of QKD based on attack ratings
title_sort experimental vulnerability analysis of qkd based on attack ratings
publisher Nature Portfolio
publishDate 2021
url https://doaj.org/article/bc914fa7037c441eac7cdef3e564b059
work_keys_str_mv AT rupeshkumar experimentalvulnerabilityanalysisofqkdbasedonattackratings
AT francescomazzoncini experimentalvulnerabilityanalysisofqkdbasedonattackratings
AT haoqin experimentalvulnerabilityanalysisofqkdbasedonattackratings
AT romainalleaume experimentalvulnerabilityanalysisofqkdbasedonattackratings
_version_ 1718386198180790272