• Featured in Physics
  • Open Access

Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution

M. Lucamarini, I. Choi, M. B. Ward, J. F. Dynes, Z. L. Yuan, and A. J. Shields
Phys. Rev. X 5, 031030 – Published 9 September 2015
Physics logo See Synopsis: How to Tame a Trojan Horse

Abstract

In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us to quantify the system security and relate it to the specification of the optical elements. The analysis is supported by the experimental characterization, within the operation regime, of reflectivity and transmission of the optical components most relevant to security.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
4 More
  • Received 15 March 2015

DOI:https://doi.org/10.1103/PhysRevX.5.031030

This article is available under the terms of the Creative Commons Attribution 3.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Published by the American Physical Society

Synopsis

Key Image

How to Tame a Trojan Horse

Published 9 September 2015

Researchers propose an approach to safeguard optical quantum key distribution systems against Trojan-horse attacks.

See more in Physics

Authors & Affiliations

M. Lucamarini1,2, I. Choi1, M. B. Ward1, J. F. Dynes1,2, Z. L. Yuan1,2, and A. J. Shields1,2

  • 1Toshiba Research Europe Limited, 208 Cambridge Science Park, Cambridge CB4 0GZ, United Kingdom
  • 2Corporate Research & Development Center, Toshiba Corporation, 1 Komukai-Toshiba-Cho, Saiwai-ku, Kawasaki 212-8582, Japan

Popular Summary

Since ancient times, the Trojan-horse attack has been known for penetrating a securely protected space. For modern-day cryptographic applications such as quantum key distribution, the existence of a protected area is a fundamental assumption, and securing this area against a Trojan-horse attack has been a long-standing problem. Even so, no quantitative analysis has been conducted thus far to combat the Trojan-horse attack on quantum systems, and an increasing number of experiments have demonstrated the severity of the attack.

In this work, we propose a quantitative method to counteract the Trojan-horse attack. Our work focuses on characterizing the components of an optical system to limit the information leakage arising from the Trojan photons. These photons are imprinted with secure information that is supposed to remain private but is instead delivered to the attacker. In some cases, the Trojan-horse attack can even proceed without alerting the system that it is under attack. By relating the security of the system to the specific characteristics of its optical components, the Trojan-horse attack can be effectively fended off. The protection architecture that we examine is entirely passive, and we provide security bounds that are easily applicable in practice. Our solution is feasible within existing experimental capabilities.

We believe that our security argument will become a standard tool in all quantum systems that need to secure a private space.

Key Image

Article Text

Click to Expand

References

Click to Expand
Issue

Vol. 5, Iss. 3 — July - September 2015

Subject Areas
Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review X

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 3.0 License. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×