Featured Research

from universities, journals, and other organizations

Quantum cryptography: Perfect eavesdropper illustrates overlooked loophole in secure communications technology

Date:
June 21, 2011
Source:
Centre for Quantum Technologies at the National University of Singapore
Summary:
Quantum key distribution (QKD) is a tool to provide confidential communication between two remote parties. QKD is perfectly secure in principle, but researchers have long been aware that loopholes may arise when QKD is put into practice. Now, for the first time, researchers have implemented a "perfect eavesdropper" that exploits just such a loophole. The results highlight the importance of identifying imperfections in the implementation of QKD as a step towards fixing them.

Hacker's suitcase: Mobile toolkit for eavesdropping on a quantum cryptography link, containing optical and electronic equipment.
Credit: © 2010 NTNU Info / Geir Mogen

Quantum key distribution (QKD) is an advanced tool for secure computer-based interactions, providing confidential communication between two remote parties by enabling them to construct a shared secret key during the course of their conversation.

QKD is perfectly secure in principle, but researchers have long been aware that loopholes may arise when QKD is put into practice. Now, for the first time, a team of researchers at the Centre for Quantum Technologies (CQT) at the National University of Singapore, the Norwegian University of Science and Technology (NTNU) and the University Graduate Center (UNIK) in Norway have created and operated a "perfect eavesdropper" for QKD that exploits just such a loophole in a typical QKD setup. As reported in the most recent issue of Nature Communications, this eavesdropper enabled researchers to obtain an entire shared secret key without alerting either of the legitimate parties that there had been a security breach. The results highlight the importance of identifying imperfections in the implementation of QKD as a first step towards fixing them.

Cryptography has traditionally relied on mathematical conjectures and thus may always be prone to being "cracked" by a clever mathematician who can figure out how to efficiently solve a mathematical puzzle, aided by the continual development of ever-faster computers. Quantum cryptography, however, relies on the laws of physics and should be infinitely more difficult to crack than traditional approaches. While there has been much discussion of the technological vulnerabilities in quantum cryptography that might jeopardize this promise, there have been no successful full field-implemented hacks of QKD security -- until now.

"Quantum key distribution has matured into a true competitor to classical key distribution. This attack highlights where we need to pay attention to ensure the security of this technology," says Christian Kurtsiefer, a professor at the Centre for Quantum Technologies at the National University of Singapore.

In the setup that was tested, researchers at the three institutions demonstrated their eavesdropping attack in realistic conditions over a 290-m fibre link between a transmitter called "Alice" and a receiver called "Bob." Alice transmits light to Bob one photon at a time, and the two build up their secret key by measuring properties of the photons. During multiple QKD sessions over a few hours, the perfect eavesdropper "Eve" obtained the same "secret" key as Bob, while the usual parameters monitored in the QKD exchange were not disturbed -- meaning that Eve remained undetected.

The researchers were able to circumvent the quantum principles that in theory provide QKD its strong security by making the photon detectors in Bob behave in a classical way. The detectors were blinded, essentially overriding the system's ability to detect a breach of security. Furthermore, this technological imperfection in QKD security was breached using off-the-shelf components.

"This confirms that non-idealities in the physical implementations of QKD can be fully and practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure," says Vadim Makarov, a postdoctoral researcher at the University Graduate Center in Kjeller, Norway. "We can not simply delegate the burden of keeping a secret to the laws of quantum physics; we need to carefully investigate the specific devices involved," says Kurtsiefer.

The open publication of how the "perfect eavesdropper" was built has already enabled this particular loophole in QKD to be closed. "I am sure there are other problems that might show that a theoretical security analysis is not necessarily exactly the same as a real-world situation," says Ilja Gerhardt, currently a visiting scholar at the University of British Columbia in Vancouver, Canada. "But this is the usual game in cryptography -- a secure communications system is created and others try to break into it. In the end this makes the different approaches better."


Story Source:

The above story is based on materials provided by Centre for Quantum Technologies at the National University of Singapore. Note: Materials may be edited for content and length.


Journal Reference:

  1. Ilja Gerhardt, Qin Liu, Antνa Lamas-Linares, Johannes Skaar, Christian Kurtsiefer, Vadim Makarov. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Communications, 2011; 2: 349 DOI: 10.1038/ncomms1348

Cite This Page:

Centre for Quantum Technologies at the National University of Singapore. "Quantum cryptography: Perfect eavesdropper illustrates overlooked loophole in secure communications technology." ScienceDaily. ScienceDaily, 21 June 2011. <www.sciencedaily.com/releases/2011/06/110614115031.htm>.
Centre for Quantum Technologies at the National University of Singapore. (2011, June 21). Quantum cryptography: Perfect eavesdropper illustrates overlooked loophole in secure communications technology. ScienceDaily. Retrieved July 31, 2014 from www.sciencedaily.com/releases/2011/06/110614115031.htm
Centre for Quantum Technologies at the National University of Singapore. "Quantum cryptography: Perfect eavesdropper illustrates overlooked loophole in secure communications technology." ScienceDaily. www.sciencedaily.com/releases/2011/06/110614115031.htm (accessed July 31, 2014).

Share This




More Computers & Math News

Thursday, July 31, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services


Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

    Environment News

    Technology News



    Save/Print:
    Share:  

    Free Subscriptions


    Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

    Get Social & Mobile


    Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

    Have Feedback?


    Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
    Mobile iPhone Android Web
    Follow Facebook Twitter Google+
    Subscribe RSS Feeds Email Newsletters
    Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins