# Faked states attack on quantum cryptosystems

@article{Makarov2005FakedSA, title={Faked states attack on quantum cryptosystems}, author={Vadim Makarov * and Dag Roar Hjelme}, journal={Journal of Modern Optics}, year={2005}, volume={52}, pages={691 - 705} }

A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Applying this attack to systems with passive basis choice on Bob's side is considered. Also, a general workflow of breaking into a running quantum cryptolink using this or Trojan horse… Expand

#### Topics from this paper

#### 148 Citations

Faked states attack and quantum cryptography protocols

- Computer Science
- ArXiv
- 2011

This paper examines the Kak quantum cryptography protocol and how it may perform under attacks and exploits a weakness in the typical real-world implementation of quantum cryptosystems. Expand

A Taxonomy of Attacks on Quantum Key Distribution

- Mathematics
- 2011

Quantum key distribution (QKD) is a new way of sharing secret cryptographic keys with unconditional security by means of encoding of secret bits in quantum particles like photons. There are various… Expand

A Taxonomy of Attacks on Quantum Key Distribution

- Mathematics
- 2011

Quantum key distribution (QKD) is a new way of sharing secret cryptographic keys with unconditional security by means of encoding of secret bits in quantum particles like photons. There are various… Expand

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Physics, Computer Science
- ArXiv
- 2013

The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment. Expand

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Computer Science
- TPNC
- 2012

It is shown that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time access to the receiver's equipment. Expand

Security Analysis of Quantum Cryptographic Protocols

- Computer Science
- 2020

In this chapter, we review the principle of some common quantum attacks, such as intercept-and-resend attack, teleportation attack, man-in-the-middle attack, participant attack, and implementation… Expand

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, Physics
- Nature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure. Expand

Time-shift attack in practical quantum cryptosystems

- Computer Science, Physics
- Quantum Inf. Comput.
- 2007

This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure. Expand

Four Phase States Eavesdropping with no Quantum Interaction

- Physics
- 2008 6th National Conference on Telecommunication Technologies and 2008 2nd Malaysia Conference on Photonics
- 2008

Quantum mechanics is the pillar that holds the security of quantum key distribution and it has been proven that perfect security can be done with some non-ideal component. In this paper we… Expand

Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system

- Computer Science
- 2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
- 2011

This work states that Eve, the would-be eavesdropper, could exploit imperfections in Alice's or Bob's equipment remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol. Expand

#### References

SHOWING 1-10 OF 28 REFERENCES

ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY

- Physics
- 1999

In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is… Expand

A practical trojan horse for bell-inequality-based quantum cryptography

- Computer Science, Physics
- Quantum Inf. Comput.
- 2002

The old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device, even when you do violate the Bell inequality. Expand

Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography

- Computer Science
- 2001

It is concluded that additional protection is necessary for currently implemented quantum key distribution systems against the large pulse attack, a new strategy of eavesdropping on quantum cryptosystems, which eliminates the need of immediate interaction with transmitted quantum states. Expand

Long-distance entanglement-based quantum key distribution

- Physics
- 2000

A detailed analysis of quantum key distribution employing entangled states is presented. We tested a system based on photon pairs entangled in energy-time optimized for long-distance transmission. It… Expand

Quantum Cryptography

- Physics
- 2001

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2… Expand

The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks?

- Physics
- 2001

Abstract Silicon avalanche photodiodes are the most sensitive photodetectors in the visible to near-infrared region for a wavelength <1000 nm. However, when they are used for single photon detection… Expand

"J."

- 1890

however (for it was the literal soul of the life of the Redeemer, John xv. io), is the peculiar token of fellowship with the Redeemer. That love to God (what is meant here is not God’s love to men)… Expand

The Code Book

- Computer Science
- 1999

The Coder should refer to the publicly available copy of the award at (or available in hard copy in Professor Franck’s library), and write manuscript notes on their copies of the Chart identifying the relevant, omitted information and its location within the award. Expand

Comput

- Comput
- 2002

N

- Lutkenhaus and J. Preskill, quant-ph/0212066
- 2002