Physical Security of Chip-Based Quantum Key Distribution Devices

Friederike Jöhlinger,Henry Semenenko,Philip Sibson,Djeylan Aktas,John Rarity,Chris Erven,Siddarth Joshi,Imad Faruque
2024-08-30
Abstract:The security proofs of the Quantum Key Distribution (QKD) protocols make certain assumptions about the operations of physical systems. Thus, appropriate modelling of devices to ensure that their operations are consistent with the models assumed in the security proof is imperative. In this paper, we explore the Trojan horse attack (THA) using Measurement Device Independent (MDI) QKD integrated photonic chips and how to avoid some of the security vulnerabilities using only on-chip components. We show that a monitor photodiode paired appropriately with enough optical isolation, given the sensitivity of the photodiode, can detect high power sniffing attacks. We also show that the placement of amplitude modulators with respect to back reflecting components and their switching time can be used to thwart a THA.
Quantum Physics
What problem does this paper attempt to address?
The paper aims to address the issue of physical security in Quantum Key Distribution (QKD) devices, particularly focusing on the security threats to chip-level QKD devices. Specifically, the paper explores the impact of Trojan Horse Attacks (THA) on Measurement-Device-Independent (MDI) QKD integrated photonic chips and proposes some methods to avoid certain security vulnerabilities, using only on-chip components to enhance the system's security. The main contributions of the paper include: 1. **Detection of High-Power Sniffing Attacks**: By combining monitoring photodiodes with sufficient optical isolation, high-power sniffing attacks can be detected. 2. **Prevention of Trojan Horse Attacks**: By adjusting the position of the modulator relative to the back-reflection components and their switching times, Trojan Horse Attacks (THA) can be effectively prevented. The paper also details experimental results and simulation analyses, demonstrating how on-chip components can be used for security monitoring and preventive measures, thereby improving the security of chip-level QKD systems in practical applications.