Simulations of distributed-phase-reference quantum key distribution protocols

Venkat Abhignan,Abhishek Jamunkar,Gokul Nair,Mohit Mittal,Megha Shrivastava
DOI: https://doi.org/10.1088/1402-4896/ad7ade
2024-09-15
Physica Scripta
Abstract:Quantum technology can enable secure communication for cryptography purposes using quantum key dis- tribution. Quantum key distribution protocol establishes a secret key between two users with security guaranteed by the laws of quantum mechanics. To define the proper implementation of a quantum key distribution system using a particular cryptography protocol, it is crucial to critically and meticulously assess the device's performance due to technological limitations in the components used. We perform sim- ulations on the ANSYS Interconnect platform to study the practical implementation of these devices using distributed-phase-reference protocols differential-phase-shift and coherent-one-way quantum key distribu- tion. Further, we briefly describe and simulate some possible eavesdropping attempts, backflash attack, trojan-horse attack and detector-blinding attack exploiting the device imperfections. The ideal simulations of these hacking attempts show how partial or complete secret key can be exposed to an eavesdropper, which can be mitigated by the implementation of discussed countermeasures.
physics, multidisciplinary
What problem does this paper attempt to address?