Abstract

In this paper the extended classification of the attacks on the protocols and practically realized systems of quantum cryptography with taking into account the kinds of attacks, which are known at present time, is proposed. This classification subdivides attacks on three classes: the passive attacks, which are possible when the honest participants use single-photon sources, passive and active attacks, which are due to imperfection of the equipment of the quantum communication systems (quantum hacking), passive and active attacks, which are due to the own protocols imperfection. The existence of such classification lets to realize the necessary security estimation of quantum cryptography protocols and to make a decision concerning choice commercially available quantum cryptosystems by criterion of their ability to resist against present and perspective methods of quantum cryptanalysis. The Trojan-horse attack and attack of the remote control of the single-photon detectors with using of the tailored bright illumination in detail are described. In the frame of describing of the detectors control attack the principle of using of the faked states is stated. In addition, the varieties of such attack, which are depended from type of avalanche photodiodes: with passive and active method of avalanche quenching, gated photodiodes, are considered.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.