111 research outputs found

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Secure gated detection scheme for quantum cryptography

    Full text link
    Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate, and the detector must be single-photon sensitive. Here we present a technique called bit-mapped gating, which is an elegant way to force the detections in the middle of the detector gate by coupling detection time and quantum bit error rate. We also discuss how to guarantee single-photon sensitivity by directly measuring detector parameters. Bit-mapped gating also provides a simple way to measure the detector blinding parameter in security proofs for quantum key distribution systems with detector efficiency mismatch, which up until now has remained a theoretical, unmeasurable quantity. Thus if single-photon sensitivity can be guaranteed within the gates, a detection scheme with bit-mapped gating satisfies the assumptions of the current security proofs.Comment: 7 pages, 3 figure

    After-gate attack on a quantum cryptosystem

    Full text link
    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.Comment: 14 pages, 8 figure

    Controlling an actively-quenched single photon detector with bright light

    Full text link
    We control using bright light an actively-quenched avalanche single-photon detector. Actively-quenched detectors are commonly used for quantum key distribution (QKD) in the visible and near-infrared range. This study shows that these detectors are controllable by the same attack used to hack passively-quenched and gated detectors. This demonstrates the generality of our attack and its possible applicability to eavsdropping the full secret key of all QKD systems using avalanche photodiodes (APDs). Moreover, the commercial detector model we tested (PerkinElmer SPCM-AQR) exhibits two new blinding mechanisms in addition to the previously observed thermal blinding of the APD, namely: malfunctioning of the bias voltage control circuit, and overload of the DC/DC converter biasing the APD. These two new technical loopholes found just in one detector model suggest that this problem must be solved in general, by incorporating generally imperfect detectors into the security proof for QKD.Comment: Expanded discussions, updated references, added a picture of decapsulated APD, reformatted to single-column style. Accepted to Opt. Express. 11 pages, 6 figure

    Device calibration impacts security of quantum key distribution

    Full text link
    Characterizing the physical channel and calibrating the cryptosystem hardware are prerequisites for establishing a quantum channel for quantum key distribution (QKD). Moreover, an inappropriately implemented calibration routine can open a fatal security loophole. We propose and experimentally demonstrate a method to induce a large temporal detector efficiency mismatch in a commercial QKD system by deceiving a channel length calibration routine. We then devise an optimal and realistic strategy using faked states to break the security of the cryptosystem. A fix for this loophole is also suggested.Comment: 4 pages + 1 page of supplementary information. Considerable modification of Eve's attack strategy and QBER minimization technique. All figures have also been improve

    Perceived social support among adolescents in Residential Youth Care

    Get PDF
    Social support may be of particular importance for vulnerable adolescents' develop-ment and health and can help them to cope with stressful life events. However,knowledge of perceived social support among adolescents in Residential Youth Care(RYC) is sparse. The present study therefore aimed to investigate perceived socialsupport among adolescents in Norwegian RYC (N= 304, mean age 16.3 years, girls57.2%), using a short form of the Social Support Questionnaire. The results werecompared with adolescents in the general population. The findings revealed thatadolescents in RYC reported a lower number of support persons compared withthe general population. Both populations reported a decreasing number of supportpersons as they aged, except for girls in RYC. The adolescents in both populationswere satisfied with the support perceived, especially those with the highest numberof support persons. However, social support providers differed between the two pop-ulations; RYC adolescents reported their extended family, other sources of support,and the institutional staff more often and their parents less. The findings are impor-tant for adolescents living in RYC, as knowledge of their social support network couldinfluence the current practices and ensure contact with important support persons,affecting their development and health

    Thermal blinding of gated detectors in quantum cryptography

    Full text link
    It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat. Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack eavesdropping the full raw and secret key without increasing the quantum bit error rate (QBER). Here we show how thermal effects in detectors under bright illumination can lead to the same outcome. We demonstrate that the detectors in a commercial QKD system Clavis2 can be blinded by heating the avalanche photo diodes (APDs) using bright illumination, so-called thermal blinding. Further, the detectors can be triggered using short bright pulses once they are blind. For systems with pauses between packet transmission such as the plug-and-play systems, thermal inertia enables Eve to apply the bright blinding illumination before eavesdropping, making her more difficult to catch.Comment: 10 pages, 12 figure

    Water chemistry, zooplankton and benthos in small lakes within the distribution area of the rare European pool frog Pelophylax lessonae (Camerano) in Norway

    Get PDF
    Summary In June 2018, water chemistry, benthos and zooplankton were investigated in 7 small lakes/ ponds within the key area of the European pool frog Pelophylax lessonae (Camerano) in Norway. The geographic distribution of the Norwegian population is minor, limited to a very few small lakes in the county of Agder in southernmost Norway. Since the species is thermophilic, reproduction success only occurs in warm summers. Accordingly, the pool frog is one of the most rare vertebrates in Norwegian fauna, classified as critically endangered in the Norwegian red list. A breeding program is today established in order to rescue this species.The article deals with potential biotope challenges most relevant for the recruitment success of the pool frog in Norway, primarily related to physical, chemical and biological conditions in surface water. In addition, terrestrial biotope challenges and potential effects of low genetic diversity in the very small Norwegian population are discussed. Sammendrag Vannkjemi, zooplankton og bunndyr i små innsjøer innenfor leveområdet til en av Norges mest truete vertebrater, Europeisk damfrosk Pelophylax lessonae (Camerano). I juni 2018, ble vannkjemi, bunndyr og zooplankton undersøkt i 7 små tjern i kjerneområdet for den damfrosken Pelophylax lessonae (Camerano) i Norge. Utbredelsen av arten er svært begrenset, og populasjonen svært liten. Arten er relativt termofil, noe som sannsynligvis er hovedårsaken til den marginale utbredelsen. Arten er trolig den mest sjeldne vertebrat i norsk fauna, klassifisert som kritisk truet på den norske rødlista. Derfor er det også etablert et avlsprogram for om mulig å kunne redde denne sjeldne vertebraten i norsk natur. I tillegg til artens klimatiske begrensninger i Norge, tar denne artikkelen opp ulike biotop- utfordringer, i første rekke i forhold til artens muligheter for reproduksjon i de akvatiske miljøene den er avhengig av. I tillegg, tas det opp enkelte terrestriske utfordringer for arten, samt effekter av lav genetisk diversitet i den svært marginale norske populasjonen.publishedVersio
    corecore