IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Vulnerability of the Synchronization Process in the Quantum Key Distribution System

Vulnerability of the Synchronization Process in the Quantum Key Distribution System
View Sample PDF
Author(s): A. P. Pljonkin (Southern Federal University, Taganrog, Russia)
Copyright: 2021
Pages: 10
Source title: Research Anthology on Advancements in Quantum Technology
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-8593-1.ch015

Purchase

View Vulnerability of the Synchronization Process in the Quantum Key Distribution System on the publisher's website for pricing and purchasing information.

Abstract

A typical structure of an auto-compensation system for quantum key distribution is given. The principle of operation of a fiber-optic system for the distribution of quantum keys with phase coding of photon states is described. The operation of the system in the synchronization mode and the formation of quantum keys was investigated. The process of detecting a time interval with an optical synchronization pulse is analyzed. The structural scheme of the experimental stand of the quantum-cryptographic network is given. Data are obtained that attest to the presence of a multiphoton signal during the transmission of sync pulses from the transceiver station to the coding and backward direction. The results of experimental studies are presented, which prove the existence of a vulnerability in the process of synchronization of the quantum key distribution system. It is shown that the use of a multiphoton optical pulse as a sync signal makes it possible for an attacker to unauthorized access to a quantum communication channel. The experimental results show that tapping a portion of the optical power from the quantum communication channel during the synchronization process allows an attacker to remain unnoticed while the quantum protocol is operating. Experimentally proved the possibility of introducing malfunctions into the operation of the quantum communication system at the stage of key formation, while remaining invisible for control means.

Related Content

M. Suchetha, Jaya Sai Kotamsetti, Dasapalli Sasidhar Reddy, S. Preethi, D. Edwin Dhas. © 2024. 14 pages.
A. Bhuvaneswari, R. Srivel, N. Elamathi, S. Shitharth, K. Sangeetha. © 2024. 15 pages.
Srinivas Kumar Palvadi. © 2024. 28 pages.
Srinivas Kumar Palvadi. © 2024. 20 pages.
Nitika Kapoor, Parminder Singh, Kusrini M. Kom, Vishal Bharti. © 2024. 19 pages.
M. Suchetha, V. V. Rama Raghavan, Shaik Fardeen, P. V. S. Nithish, S. Preethi, D. Edwin Dhas. © 2024. 13 pages.
Damandeep Kaur, Shamandeep Singh, Simarjeet Kaur, Gurpreet Singh, Rani Kumari. © 2024. 17 pages.
Body Bottom