Quantum cryptography and quantum cryptanalysis
MetadataShow full item record
This doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 through 2007. The opening parts contain a brief introduction into quantum cryptography as well as an overview of all existing single photon detection techniques for visible and near infrared light. Then, our implementation of a fiber optic quantum key distribution (QKD) system is described. We employ a one-way phase coding scheme with a 1310 nm attenuated laser source and a polarization-maintaining Mach-Zehnder interferometer. A feature of our scheme is that it tracks phase drift in the interferometer at the single photon level instead of employing hardware phase control measures. An optimal phase tracking algorithm has been developed, implemented and tested. Phase tracking accuracy of +-10 degrees is achieved when approximately 200 photon counts are collected in each cycle of adjustment. Another feature of our QKD system is that it uses a single photon detector based on a germanium avalanche photodiode gated at 20 MHz. To make possible this relatively high gating rate, we have developed, implemented and tested an afterpulse blocking technique, when a number of gating pulses is blocked after each registered avalanche. This technique allows to increase the key generation rate nearly proportionally to the increase of the gating rate. QKD has been demonstrated in the laboratory setting with only a very limited success: by the time of the thesis completion we had malfunctioning components in the setup, and the quantum bit error rate remained unstable with its lowest registered value of about 4%. More than half of the thesis is devoted to various security aspects of QKD. We have studied several attacks that exploit component imperfections and loopholes in optical schemes. In a large pulse attack, settings of modulators inside Alice's and Bob's setups are read out by external interrogating light pulses, without interacting with quantum states and without raising security alarms. An external measurement of phase shift at Alice's phase modulator in our setup has been demonstrated experimentally. In a faked states attack, Eve intercepts Alice's qubits and then utilizes various optical imperfections in Bob's scheme to construct and resend light pulses in such a way that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Construction of such faked states using several different imperfections is discussed. Also, we sketch a practical workflow of breaking into a running quantum cryptolink for the two abovementioned classes of attacks. A special attention is paid to a common imperfection when sensitivity of Bob's two detectors relative to one another can be controlled by Eve via an external parameter, for example via the timing of the incoming pulse. This imperfection is illustrated by measurements on two different single photon detectors. Quantitative results for a faked states attack on the Bennett-Brassard 1984 (BB84) and the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocols using this imperfection are obtained. It is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols. Furthermore we have attempted to integrate this imperfection of detectors into the general security proof for the BB84 protocol. For all attacks, their applicability to and implications for various known QKD schemes are considered, and countermeasures against the attacks are proposed. The thesis incorporates published papers [J. Mod. Opt. 48, 2023 (2001)], [Appl. Opt. 43, 4385 (2004)], [J. Mod. Opt. 52, 691 (2005)], [Phys. Rev. A 74, 022313 (2006)], and [quant-ph/0702262].
Has partsVakhitov, Artem; Makarov, Vadim; Hjelme, Dag Roar. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography. J. Mod. Opt.. 48(13): 2023-2038, 2001.
Makarov, Vadim; Brylevski, Alexei; Hjelme, Dag Roar. Real-time phase tracking in single-photon interferometers. Appl. Opt.. 43(22): 4385-4392, 2004.
Makarov, Vadim; Hjelme, Dag Roar. Faked states attack on quantum cryptosystems. J. Mod. Opt.. 52(5): 691-705, 2005.
Makarov, Vadim; Anisimov, Andrey; Skaar, Johannes. Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A. 74: 022313, 2006.
PublisherFakultet for informasjonsteknologi, matematikk og elektroteknikk
SeriesDoktoravhandlinger ved NTNU, 1503-8181; 2007:67
Showing items related by title, author, creator and subject.
Bungum, Berit; Bøe, Maria Vetleseter; Henriksen, Ellen Karoline (Journal article; Peer reviewed, 2018)Quantum physics challenges our views of the physical world anddescribes phenomena that cannot be directly observed. The useof language is hence essential in the teaching of quantum physics.With a sociocultural view of ...
On the Development and Standardisation of Post-Quantum Cryptography - A Synopsis of the NIST Post-Quantum Cryptography Standardisation Process, its Incentives, and Submissions Legernæs, Maja Worren (Master thesis, 2018)Due to developments within the field of quantum computers, the need for developing and implementing quantum-resistant cryptographic algorithms has become more urgent. Using such computers, many of today's most prominent ...
Linder, Jacob (Doktoravhandlinger ved NTNU, 1503-8181; 2009:43, Doctoral thesis, 2009) This thesis presents some of the main findings from twenty-five research articles. These papers may roughly be categorized into three fields: i) Proximity structures of superconductors and ferromagnets, ii) Interplay ...