language-icon Old Web
English
Sign In

Invisible Trojan-horse attack

2017 
We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single- photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance at 1924 nm versus that at 1536 nm, at which a full-fledged attack would have failed as reported earlier in N. Jain et al., New J. Phys. 16, 123030 (2014). At 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    22
    References
    0
    Citations
    NaN
    KQI
    []