Using Modeling and Simulation to Study Photon Number Splitting Attacks

Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 4; pp. 2188 - 2197
Main Authors Mailloux, Logan O., Hodson, Douglas D., Grimaila, Michael R., Engle, Ryan D., Mclaughlin, Colin V., Baumgartner, Gerald B.
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key distribution channel necessarily introduces detectable errors and shows promise for high-security environments, such as banking, government, and military. However, QKD systems are vulnerable to advanced theoretical and experimental attacks. In this paper, the photon number splitting (PNS) attack is studied in a specialized QKD modeling and simulation framework. First, a detailed treatment of the PNS attack is provided with emphasis on practical considerations, such as performance limitations and realistic sources of error. Second, ideal and non-ideal variations of the PNS attack are studied to measure the eavesdropper's information gain on the QKD-generated secret key bits and examine the detectability of PNS attacks with respect to both quantum bit error rate and the decoy state protocol. Finally, this paper provides a repeatable methodology for efficiently studying advanced attacks, both realized and notional, against QKD systems and more generally quantum communication protocols.
AbstractList Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key distribution channel necessarily introduces detectable errors and shows promise for high-security environments, such as banking, government, and military. However, QKD systems are vulnerable to advanced theoretical and experimental attacks. In this paper, the photon number splitting (PNS) attack is studied in a specialized QKD modeling and simulation framework. First, a detailed treatment of the PNS attack is provided with emphasis on practical considerations, such as performance limitations and realistic sources of error. Second, ideal and non-ideal variations of the PNS attack are studied to measure the eavesdropper's information gain on the QKD-generated secret key bits and examine the detectability of PNS attacks with respect to both quantum bit error rate and the decoy state protocol. Finally, this paper provides a repeatable methodology for efficiently studying advanced attacks, both realized and notional, against QKD systems and more generally quantum communication protocols.
Author Mailloux, Logan O.
Hodson, Douglas D.
Grimaila, Michael R.
Engle, Ryan D.
Baumgartner, Gerald B.
Mclaughlin, Colin V.
Author_xml – sequence: 1
  givenname: Logan O.
  orcidid: 0000-0002-7034-8083
  surname: Mailloux
  fullname: Mailloux, Logan O.
  email: logan.mailloux@afit.edu
  organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
– sequence: 2
  givenname: Douglas D.
  surname: Hodson
  fullname: Hodson, Douglas D.
  organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
– sequence: 3
  givenname: Michael R.
  surname: Grimaila
  fullname: Grimaila, Michael R.
  organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
– sequence: 4
  givenname: Ryan D.
  surname: Engle
  fullname: Engle, Ryan D.
  organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA
– sequence: 5
  givenname: Colin V.
  surname: Mclaughlin
  fullname: Mclaughlin, Colin V.
  organization: Naval Research Laboratory, Washington, DC, USA
– sequence: 6
  givenname: Gerald B.
  surname: Baumgartner
  fullname: Baumgartner, Gerald B.
  organization: Laboratory for Telecommunications Sciences, College Park, MD, USA
BookMark eNp9kUtPGzEUhS0EEinwC9iM1HWC349lFEGJlD6kgbXlsW-C08k49XgW_HsmDK2qLno39_rqfEdXPp_QeZc6QOiW4AUh2NwtV6v7ul5QTOSCCiGUMGdoRok0cyaYPP9rvkQ3fb_HY-lxJdQMPTz3sdtVX1OA9jS4LlR1PAytKzF1VUlVXYbwWv14SWV8fxsODeSqPraxlJN-WYrzP_trdLF1bQ83H_0KPT_cP60e55vvX9ar5WbuOdZlDkZhGhrdSM0bzrAG5hRtiNfQSKel8KAUx94rwYTQ3BhBOOgtjCJpVGBXaD35huT29pjjweVXm1y074uUd9blEn0L1mAuGOXBMOd5wMQoLdyWcwIqcCL96PV58jrm9GuAvth9GnI3nm8pF8JwibkaVWZS-Zz6PsPW-ljeP6dkF1tLsD2lYKcU7CkF-5HCyLJ_2N8X_5-6nagIAH8IxYWkmLI3YsGTHQ
CODEN IAECCG
CitedBy_id crossref_primary_10_1088_1402_4896_ad7ade
crossref_primary_10_1109_ACCESS_2020_2966549
crossref_primary_10_1109_ACCESS_2018_2866554
crossref_primary_10_1109_JLT_2023_3321774
crossref_primary_10_1109_ACCESS_2022_3188798
crossref_primary_10_1016_j_icte_2023_02_010
crossref_primary_10_1080_09500340_2022_2041752
crossref_primary_10_1109_ACCESS_2024_3504815
crossref_primary_10_3390_app7020212
crossref_primary_10_1364_OPTICA_485389
crossref_primary_10_3390_electronics7040049
crossref_primary_10_1103_PhysRevLett_131_110802
crossref_primary_10_1016_j_isci_2022_105897
crossref_primary_10_1109_ACCESS_2019_2898426
crossref_primary_10_1364_JOSAB_541759
crossref_primary_10_1007_s11128_018_1813_1
crossref_primary_10_1364_OE_529257
crossref_primary_10_2139_ssrn_4186253
crossref_primary_10_1109_OJCOMS_2021_3106659
crossref_primary_10_1177_1548512916666740
Cites_doi 10.1109/MSP.2004.54
10.1103/PhysRevLett.85.1330
10.1103/PhysRevA.71.042316
10.1080/09500340308235253
10.1017/CBO9780511813719
10.1002/j.1538-7305.1949.tb00928.x
10.1103/PhysRevA.72.012322
10.1017/CBO9780511976667
10.1038/nphoton.2009.230
10.1109/MSP.2015.11
10.1007/BF00191318
10.1103/PhysRevA.72.012326
10.1109/ISIT.2004.1365172
10.1103/PhysRevA.84.042331
10.1109/T-AIEE.1926.5061224
10.1103/PhysRevA.51.1863
10.1103/RevModPhys.81.1301
10.1364/OE.23.007583
10.1088/1367-2630/4/1/344
10.1103/PhysRevA.65.012312
10.1103/PhysRevA.69.012309
10.1103/PhysRevLett.94.230503
10.1103/PhysRevLett.94.230504
10.1038/22275
10.1103/PhysRevA.61.052304
10.1103/PhysRevLett.91.057901
10.1109/ACCESS.2015.2399101
10.1364/OE.22.021739
10.1103/RevModPhys.74.145
10.1140/epjd/e2010-00103-y
10.1038/nphoton.2009.231
10.1038/25059
10.1177/1548512915588572
10.1109/MCOM.2015.7295459
10.1103/PhysRevLett.92.057901
10.1145/1008908.1008920
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2016.2555759
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Open Access Journals (DOAJ)
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Materials Research Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 2197
ExternalDocumentID oai_doaj_org_article_9045324d93ac4d019785af441e7d416c
10_1109_ACCESS_2016_2555759
7456202
Genre orig-research
GrantInformation_xml – fundername: Laboratory for Telecommunication Sciences
  grantid: 5743400-304-6448
– fundername: Department of Defense High Performance Computing Modernization Program within the Air Force Research Laboratory, Wright-Patterson AFB, OH, USA
  funderid: 10.13039/100006602
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-e9702db8b684b4308e3a72b1c8eb6a865ce7740cc753558499514e8fe72b697d3
IEDL.DBID DOA
ISSN 2169-3536
IngestDate Wed Aug 27 01:13:29 EDT 2025
Sun Jun 29 14:15:29 EDT 2025
Tue Jul 01 04:10:42 EDT 2025
Thu Apr 24 22:54:03 EDT 2025
Wed Aug 27 05:51:10 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords photon number splitting attack
Quantum key distribution
decoy state protocol
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/USG.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-e9702db8b684b4308e3a72b1c8eb6a865ce7740cc753558499514e8fe72b697d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7034-8083
OpenAccessLink https://doaj.org/article/9045324d93ac4d019785af441e7d416c
PQID 2455946047
PQPubID 4845423
PageCount 10
ParticipantIDs crossref_citationtrail_10_1109_ACCESS_2016_2555759
crossref_primary_10_1109_ACCESS_2016_2555759
doaj_primary_oai_doaj_org_article_9045324d93ac4d019785af441e7d416c
proquest_journals_2455946047
ieee_primary_7456202
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20160000
2016-00-00
20160101
2016-01-01
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – year: 2016
  text: 20160000
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2016
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref34
ref12
ref37
ref36
ref14
ref31
ref30
ref33
ref11
ref32
gerry (ref35) 2005
nogues (ref27) 1999; 400
harrington (ref42) 2005
ref39
ref17
ref38
ref16
ref19
ref18
(ref2) 2015
qi (ref10) 2010
mailloux (ref9) 2015; 36
ref24
ref23
ref26
ref25
ref20
ref41
ref22
ref44
ref21
ref43
ref28
scarani (ref1) 2009
ref29
ref8
ref7
ref4
bennett (ref15) 1984
ref6
(ref3) 2015
ref5
ref40
References_xml – year: 2009
  ident: ref1
  article-title: The black paper of quantum cryptography: Real implementation problems
– ident: ref11
  doi: 10.1109/MSP.2004.54
– ident: ref4
  doi: 10.1103/PhysRevLett.85.1330
– ident: ref26
  doi: 10.1103/PhysRevA.71.042316
– ident: ref23
  doi: 10.1080/09500340308235253
– ident: ref33
  doi: 10.1017/CBO9780511813719
– ident: ref17
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– ident: ref41
  doi: 10.1103/PhysRevA.72.012322
– ident: ref32
  doi: 10.1017/CBO9780511976667
– year: 2010
  ident: ref10
  article-title: A brief introduction of quantum cryptography for engineers
– ident: ref43
  doi: 10.1038/nphoton.2009.230
– ident: ref6
  doi: 10.1109/MSP.2015.11
– ident: ref20
  doi: 10.1007/BF00191318
– ident: ref39
  doi: 10.1103/PhysRevA.72.012326
– ident: ref36
  doi: 10.1109/ISIT.2004.1365172
– ident: ref34
  doi: 10.1103/PhysRevA.84.042331
– ident: ref16
  doi: 10.1109/T-AIEE.1926.5061224
– ident: ref21
  doi: 10.1103/PhysRevA.51.1863
– ident: ref13
  doi: 10.1103/RevModPhys.81.1301
– ident: ref18
  doi: 10.1364/OE.23.007583
– ident: ref22
  doi: 10.1088/1367-2630/4/1/344
– ident: ref28
  doi: 10.1103/PhysRevA.65.012312
– ident: ref24
  doi: 10.1103/PhysRevA.69.012309
– ident: ref40
  doi: 10.1103/PhysRevLett.94.230503
– ident: ref38
  doi: 10.1103/PhysRevLett.94.230504
– volume: 400
  start-page: 239
  year: 1999
  ident: ref27
  article-title: Seeing a single photon without destroying it
  publication-title: Nature
  doi: 10.1038/22275
– ident: ref5
  doi: 10.1103/PhysRevA.61.052304
– ident: ref37
  doi: 10.1103/PhysRevLett.91.057901
– ident: ref7
  doi: 10.1109/ACCESS.2015.2399101
– year: 2005
  ident: ref42
  article-title: Enhancing practical security of quantum key distribution with a few decoy states
– ident: ref19
  doi: 10.1364/OE.22.021739
– ident: ref12
  doi: 10.1103/RevModPhys.74.145
– year: 2015
  ident: ref2
  publication-title: Quantum Hacking Lab
– year: 2015
  ident: ref3
  publication-title: Quantum Key Distribution Stan-dards
– ident: ref30
  doi: 10.1140/epjd/e2010-00103-y
– ident: ref31
  doi: 10.1038/nphoton.2009.231
– start-page: 175
  year: 1984
  ident: ref15
  article-title: Quantum cryptography: Public key distribution and coin tossing
  publication-title: Proc IEEE Int Conf Comput Syst Signal Process
– ident: ref29
  doi: 10.1038/25059
– ident: ref8
  doi: 10.1177/1548512915588572
– volume: 36
  start-page: 199
  year: 2015
  ident: ref9
  article-title: Test and evaluation of complex cyber security systems: A case study in using modeling and simulation to more efficiently understand, test, and evaluate the security of quantum key distribution systems
  publication-title: ITE J
– year: 2005
  ident: ref35
  publication-title: Introductory Quantum Optics
– ident: ref44
  doi: 10.1109/MCOM.2015.7295459
– ident: ref25
  doi: 10.1103/PhysRevLett.92.057901
– ident: ref14
  doi: 10.1145/1008908.1008920
SSID ssj0000816957
Score 2.1553566
Snippet Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2188
SubjectTerms Bit error rate
Cryptography
Decoy State Protocol
Eavesdropping
Gain measurment
Keying
Modelling
Photon number splitting
Photon Number Splitting Attack
Photonics
Photons
Protocols
Quantum cryptography
Quantum Key Distribution
Quantum mechanics
Qubits (quantum computing)
Splitting
SummonAdditionalLinks – databaseName: IEEE Xplore
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VnuDAqyAWCvKBY7N1N3ZsH5cVqwqJCqlU6s3yYyIQsIsge4Bfz4zjjXgJcYsiO3Iy4_gbe-b7AJ6T06ALbWp071jCLDHlbasapWTuY7Y6x8L2edGdX6lX1_r6AE6mWhhELMlnOOfLcpaft2nHW2WnhuE6M0feoMBtrNWa9lNYQMJpU4mFzqQ7Xa5W9A6cvdXNCTizEuUvi0_h6K-iKn_8icvysr4Dr_cDG7NKPsx3Q5yn779xNv7vyO_C7YozxXJ0jHtwgJv7cOsn9sEjWJd0AcFqaFyTLsImi8v3n6qelxi2gpMMv4k377YEEMVF0Q4Rl4RaS660WA4DF-g_gKv1y7er86bKKjRJSTs06Ixc5GhjZ1VUrbTYBrOIZ8li7ILtdELChDIlimQ04RNHIEyh7ZEadc7k9iEcbrYbfATC9TlQvEaope2Vpt4xYsAQsjTJKW1nsNh_b58q5zhLX3z0JfaQzo9G8mwkX400g5Op0-eRcuPfzV-wIaemzJddbpABfJ1-3hFyJeiYXRuSygRrjdWhJyiIJhMkTTM4YqNND6n2msHx3i18ndtf_UJRFKY6qczjv_d6Ajd5gONGzTEcDl92-JSgyxCfFZ_9AWQg6WA
  priority: 102
  providerName: IEEE
Title Using Modeling and Simulation to Study Photon Number Splitting Attacks
URI https://ieeexplore.ieee.org/document/7456202
https://www.proquest.com/docview/2455946047
https://doaj.org/article/9045324d93ac4d019785af441e7d416c
Volume 4
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8QwEA3iSQ_iJ66ukoNHq9k2aZLjuriIBxF0wVvIV1HQXdF68N87k2aXFUEvXkvSNpNp5k06eY-QE3CaqG3lC9FolDDzSHlb8YJzFhoXlAgusX3e1FcTfv0gHpakvrAmrKMH7gx3rgFzQNAPurKeBwAkUgnbQBCPMgCY8Lj6QsxbSqbSGqwGtRYy0wwNmD4fjkYwIqzlqs8ARqMu5bdQlBj7s8TKj3U5BZvxJtnIKJEOu7fbIitxuk3Wl7gDd8g4_eynqGWGJ8qpnQZ69_SS1bhoO6NYIvhJbx9nAO_oTVL-oHeAOVOlMx22LR6v3yWT8eX96KrIogiF50y1RdSSlcEpVyvueMVUrKws3cCr6GqrauEjIDrmPeQhAtCFBgjFo2oiNKq1DNUeWZ3OpnGfUN0EC9kWYI6q4QJ6OxdttDYw6TUXqkfKuX2Mz4zhKFzxbFLmwLTpjGrQqCYbtUdOF51eO8KM35tfoOEXTZHtOl0AHzDZB8xfPtAjOzhti5tITOtY2SP9-TSa_GW-m5JDDsVrxuXBfzz6kKzhcLpNmT5Zbd8-4hHAlNYdJ488TicKvwA5cN_u
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3LbtQwFL0qZQEsKFAQAwW8gB2Zuokd2wsWw8BoSssIqa3UnfErAgEziGZUtd_Cr_BvvXY8ES-xq8QuinytxD6xj53rcwCeImiCMpUreKOihZmLkrcVKxijvrFecm-T2uesnh6xN8f8eA2-92dhQggp-SwM42X6l-8Xbhm3yrZFpOu0zCmUe-HsFBdoJy92X2FvPivLyevD8bTIHgKFY1S2RVCClt5KW0tmWUVlqIwo7Y6TwdZG1twFJEDUOaTtHCdjhYyDBdkELFQr4Sus9wpcRZ7By-50WL-DEy0rFBdZymiHqu3ReIytFvPF6iFS9eh9-ct0l1wBso3LH2N_mtAmG_Bj1RRdHsun4bK1Q3f-m0rk_9pWt-BmZtJk1EH_NqyF-R248ZO-4iZMUkIEiX5v8dQ9MXNPDj5-yY5lpF2QmEZ5Rt59WCAFJrPkjkIOkJenbHAyatsoQXAXji7lRe7B-nwxD_eBqMYbXJEiL6saxjHa2mCCMZ4KpxiXAyhX_atdVlWP5h6fdVpdUaU7UOgICp1BMYDnfdDXTlTk38VfRuD0RaMieLqBHa7zAKMVcnMkx15VxjGPxF1Ibhoku0F4JN1uAJsRJH0lGR8D2FrBUOfR60SXiHbFasrEg79HPYFr08O3-3p_d7b3EK7Hh-22pbZgvf22DI-QqLX2cfpeCLy_bNBdAFHPRVY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+Modeling+and+Simulation+to+Study+Photon+Number+Splitting+Attacks&rft.jtitle=IEEE+access&rft.au=Mailloux%2C+Logan+O.&rft.au=Hodson%2C+Douglas+D.&rft.au=Grimaila%2C+Michael+R.&rft.au=Engle%2C+Ryan+D.&rft.date=2016&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=4&rft.spage=2188&rft.epage=2197&rft_id=info:doi/10.1109%2FACCESS.2016.2555759&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2016_2555759
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon