3 research outputs found
The Rationale for the Optimal Continuous-Variable Quantum Key Distribution Protocol
This article describes the current technical level of developments in the field of continuous-variable quantum key distribution (CV-QKD). Various classifications are described, the criteria are analyzed, and the optimal protocol is selected. The analysis is focused around device-dependent schemes with a theoretical emphasis, and therefore, a detailed analysis of device-independent CV-QKD and side-channel attacks is out of the scope of the work. However, the latter, one way or another, is taken into account when describing possible classifications. The choice of the optimal protocol was carried out, first of all, from the potential possibility of integration into existing network telecommunication infrastructures. Predominantly, the general classification is carried out in such a way that it is possible to draw up a specific protocol, depending on the task of implementation
Quantum key distribution component loopholes in 1500-2100 nm range perspective for Trojan-horse attacks
Vulnerabilities of components used in quantum key distribution (QKD) systems
affect its implementation security and must be taken into consideration during
system development and security analysis. In this paper, we investigated
transmission of fiber optical elements, which are commonly used in QKD systems
for designing countermeasures against Trojan-horse attacks, in 1500-2100 nm
range. As a result, we found loopholes in their transmission spectra which open
possibilities for eavesdropping. We also suggested a simple passive
countermeasure based on violation of total internal reflection in single-mode
fiber, that leads to additional insertion losses of at least 60 dB for
double-pass Trojan-horse probe pulses for wavelengths longer than 1830 nm.Comment: 10 pages, 12 figure