Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis

Ivan S. Sushchev,Daniil S. Bulavkin,Kirill E. Bugai,Anna S. Sidelnikova,Dmitriy A. Dvoretskiy
DOI: https://doi.org/10.1103/physrevapplied.22.034032
IF: 4.6
2024-09-14
Physical Review Applied
Abstract:This paper presents a theoretical and experimental demonstration of a security analysis of a Trojan-horse attack (THA) on a real-world quantum key distribution (QKD) system. We show that the upper bound on the information leakage depends solely on the fidelity between the states of the adversary. We find the lower bound for fidelity between THA states in both the polarization- and phase-coding BB84 protocols, considering both pure and mixed states. Our bounds depend only on the mean photon number per pulse available to an adversary. We also present an experimental analysis of a QKD system, including optical time-domain reflectometry measurements with centimeter resolution and spectral transmittance measurements for optical defense elements ranging from 1100 to 1800 nm with a noise floor lower than −100 dB. Finally, by considering the optimal attack, we obtain the value of the mean photon number per pulse available to an adversary and calculate the key leakage that needs to be eliminated during the privacy amplification procedure. https://doi.org/10.1103/PhysRevApplied.22.034032 Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI. Published by the American Physical Society
physics, applied
What problem does this paper attempt to address?