97 research outputs found

    Quantum key distribution with hacking countermeasures and long term field trial

    Get PDF
    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered

    General immunity and superadditivity of two-way Gaussian quantum cryptography

    Get PDF
    We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks

    Operando study of iridium acetylacetonate decomposition on amorphous silica-alumina for bifunctional catalyst preparation

    No full text
    Nassreddine, Salim Bergeret, Gerard Jouguet, Bernadette Geantet, Christophe Piccolo, LaurentThe decomposition of iridium acetylacetonate Ir(acac)(3) impregnated on amorphous silica-alumina (ASA) has been investigated by combined thermogravimetry-differential thermal analysis-mass spectrometry (TG-DTA-MS) and by in situ X-ray diffraction (XRD). The resulting Ir/ASA hydrotreating catalysts have also been characterized by transmission electron microscopy (TEM). The effects of heating treatments under oxidative, reductive or inert gas flows are compared with each other and with similar experiments on ASA-supported acetylacetone (acacH). It is shown that Ir(acac)(3) undergoes exothermic combustion during calcination in air, leading to agglomerated IrO2 particles. Conversely, direct reduction involves hydrogenolysis of the acac followed by hydrogenation of the ligand residues to alkanes and water. These two processes are catalyzed by Ir clusters, the gradual growth of which is followed in situ by XRD. The resulting nanoparticles are highly and homogeneously dispersed
    • …
    corecore