Using Modeling and Simulation to Study Photon Number Splitting Attacks
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key...
Saved in:
Published in | IEEE access Vol. 4; pp. 2188 - 2197 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key distribution channel necessarily introduces detectable errors and shows promise for high-security environments, such as banking, government, and military. However, QKD systems are vulnerable to advanced theoretical and experimental attacks. In this paper, the photon number splitting (PNS) attack is studied in a specialized QKD modeling and simulation framework. First, a detailed treatment of the PNS attack is provided with emphasis on practical considerations, such as performance limitations and realistic sources of error. Second, ideal and non-ideal variations of the PNS attack are studied to measure the eavesdropper's information gain on the QKD-generated secret key bits and examine the detectability of PNS attacks with respect to both quantum bit error rate and the decoy state protocol. Finally, this paper provides a repeatable methodology for efficiently studying advanced attacks, both realized and notional, against QKD systems and more generally quantum communication protocols. |
---|---|
AbstractList | Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique nature of QKD that ensures eavesdropping on the key distribution channel necessarily introduces detectable errors and shows promise for high-security environments, such as banking, government, and military. However, QKD systems are vulnerable to advanced theoretical and experimental attacks. In this paper, the photon number splitting (PNS) attack is studied in a specialized QKD modeling and simulation framework. First, a detailed treatment of the PNS attack is provided with emphasis on practical considerations, such as performance limitations and realistic sources of error. Second, ideal and non-ideal variations of the PNS attack are studied to measure the eavesdropper's information gain on the QKD-generated secret key bits and examine the detectability of PNS attacks with respect to both quantum bit error rate and the decoy state protocol. Finally, this paper provides a repeatable methodology for efficiently studying advanced attacks, both realized and notional, against QKD systems and more generally quantum communication protocols. |
Author | Mailloux, Logan O. Hodson, Douglas D. Grimaila, Michael R. Engle, Ryan D. Baumgartner, Gerald B. Mclaughlin, Colin V. |
Author_xml | – sequence: 1 givenname: Logan O. orcidid: 0000-0002-7034-8083 surname: Mailloux fullname: Mailloux, Logan O. email: logan.mailloux@afit.edu organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA – sequence: 2 givenname: Douglas D. surname: Hodson fullname: Hodson, Douglas D. organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA – sequence: 3 givenname: Michael R. surname: Grimaila fullname: Grimaila, Michael R. organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA – sequence: 4 givenname: Ryan D. surname: Engle fullname: Engle, Ryan D. organization: Air Force Institute of Technology, Wright-Patterson AFB, OH, USA – sequence: 5 givenname: Colin V. surname: Mclaughlin fullname: Mclaughlin, Colin V. organization: Naval Research Laboratory, Washington, DC, USA – sequence: 6 givenname: Gerald B. surname: Baumgartner fullname: Baumgartner, Gerald B. organization: Laboratory for Telecommunications Sciences, College Park, MD, USA |
BookMark | eNp9kUtPGzEUhS0EEinwC9iM1HWC349lFEGJlD6kgbXlsW-C08k49XgW_HsmDK2qLno39_rqfEdXPp_QeZc6QOiW4AUh2NwtV6v7ul5QTOSCCiGUMGdoRok0cyaYPP9rvkQ3fb_HY-lxJdQMPTz3sdtVX1OA9jS4LlR1PAytKzF1VUlVXYbwWv14SWV8fxsODeSqPraxlJN-WYrzP_trdLF1bQ83H_0KPT_cP60e55vvX9ar5WbuOdZlDkZhGhrdSM0bzrAG5hRtiNfQSKel8KAUx94rwYTQ3BhBOOgtjCJpVGBXaD35huT29pjjweVXm1y074uUd9blEn0L1mAuGOXBMOd5wMQoLdyWcwIqcCL96PV58jrm9GuAvth9GnI3nm8pF8JwibkaVWZS-Zz6PsPW-ljeP6dkF1tLsD2lYKcU7CkF-5HCyLJ_2N8X_5-6nagIAH8IxYWkmLI3YsGTHQ |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_1088_1402_4896_ad7ade crossref_primary_10_1109_ACCESS_2020_2966549 crossref_primary_10_1109_ACCESS_2018_2866554 crossref_primary_10_1109_JLT_2023_3321774 crossref_primary_10_1109_ACCESS_2022_3188798 crossref_primary_10_1016_j_icte_2023_02_010 crossref_primary_10_1080_09500340_2022_2041752 crossref_primary_10_1109_ACCESS_2024_3504815 crossref_primary_10_3390_app7020212 crossref_primary_10_1364_OPTICA_485389 crossref_primary_10_3390_electronics7040049 crossref_primary_10_1103_PhysRevLett_131_110802 crossref_primary_10_1016_j_isci_2022_105897 crossref_primary_10_1109_ACCESS_2019_2898426 crossref_primary_10_1364_JOSAB_541759 crossref_primary_10_1007_s11128_018_1813_1 crossref_primary_10_1364_OE_529257 crossref_primary_10_2139_ssrn_4186253 crossref_primary_10_1109_OJCOMS_2021_3106659 crossref_primary_10_1177_1548512916666740 |
Cites_doi | 10.1109/MSP.2004.54 10.1103/PhysRevLett.85.1330 10.1103/PhysRevA.71.042316 10.1080/09500340308235253 10.1017/CBO9780511813719 10.1002/j.1538-7305.1949.tb00928.x 10.1103/PhysRevA.72.012322 10.1017/CBO9780511976667 10.1038/nphoton.2009.230 10.1109/MSP.2015.11 10.1007/BF00191318 10.1103/PhysRevA.72.012326 10.1109/ISIT.2004.1365172 10.1103/PhysRevA.84.042331 10.1109/T-AIEE.1926.5061224 10.1103/PhysRevA.51.1863 10.1103/RevModPhys.81.1301 10.1364/OE.23.007583 10.1088/1367-2630/4/1/344 10.1103/PhysRevA.65.012312 10.1103/PhysRevA.69.012309 10.1103/PhysRevLett.94.230503 10.1103/PhysRevLett.94.230504 10.1038/22275 10.1103/PhysRevA.61.052304 10.1103/PhysRevLett.91.057901 10.1109/ACCESS.2015.2399101 10.1364/OE.22.021739 10.1103/RevModPhys.74.145 10.1140/epjd/e2010-00103-y 10.1038/nphoton.2009.231 10.1038/25059 10.1177/1548512915588572 10.1109/MCOM.2015.7295459 10.1103/PhysRevLett.92.057901 10.1145/1008908.1008920 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D DOA |
DOI | 10.1109/ACCESS.2016.2555759 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Open Access Journals (DOAJ) |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2169-3536 |
EndPage | 2197 |
ExternalDocumentID | oai_doaj_org_article_9045324d93ac4d019785af441e7d416c 10_1109_ACCESS_2016_2555759 7456202 |
Genre | orig-research |
GrantInformation_xml | – fundername: Laboratory for Telecommunication Sciences grantid: 5743400-304-6448 – fundername: Department of Defense High Performance Computing Modernization Program within the Air Force Research Laboratory, Wright-Patterson AFB, OH, USA funderid: 10.13039/100006602 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c408t-e9702db8b684b4308e3a72b1c8eb6a865ce7740cc753558499514e8fe72b697d3 |
IEDL.DBID | DOA |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:13:29 EDT 2025 Sun Jun 29 14:15:29 EDT 2025 Tue Jul 01 04:10:42 EDT 2025 Thu Apr 24 22:54:03 EDT 2025 Wed Aug 27 05:51:10 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | photon number splitting attack Quantum key distribution decoy state protocol |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/USG.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-e9702db8b684b4308e3a72b1c8eb6a865ce7740cc753558499514e8fe72b697d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-7034-8083 |
OpenAccessLink | https://doaj.org/article/9045324d93ac4d019785af441e7d416c |
PQID | 2455946047 |
PQPubID | 4845423 |
PageCount | 10 |
ParticipantIDs | crossref_citationtrail_10_1109_ACCESS_2016_2555759 crossref_primary_10_1109_ACCESS_2016_2555759 doaj_primary_oai_doaj_org_article_9045324d93ac4d019785af441e7d416c proquest_journals_2455946047 ieee_primary_7456202 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20160000 2016-00-00 20160101 2016-01-01 |
PublicationDateYYYYMMDD | 2016-01-01 |
PublicationDate_xml | – year: 2016 text: 20160000 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2016 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref34 ref12 ref37 ref36 ref14 ref31 ref30 ref33 ref11 ref32 gerry (ref35) 2005 nogues (ref27) 1999; 400 harrington (ref42) 2005 ref39 ref17 ref38 ref16 ref19 ref18 (ref2) 2015 qi (ref10) 2010 mailloux (ref9) 2015; 36 ref24 ref23 ref26 ref25 ref20 ref41 ref22 ref44 ref21 ref43 ref28 scarani (ref1) 2009 ref29 ref8 ref7 ref4 bennett (ref15) 1984 ref6 (ref3) 2015 ref5 ref40 |
References_xml | – year: 2009 ident: ref1 article-title: The black paper of quantum cryptography: Real implementation problems – ident: ref11 doi: 10.1109/MSP.2004.54 – ident: ref4 doi: 10.1103/PhysRevLett.85.1330 – ident: ref26 doi: 10.1103/PhysRevA.71.042316 – ident: ref23 doi: 10.1080/09500340308235253 – ident: ref33 doi: 10.1017/CBO9780511813719 – ident: ref17 doi: 10.1002/j.1538-7305.1949.tb00928.x – ident: ref41 doi: 10.1103/PhysRevA.72.012322 – ident: ref32 doi: 10.1017/CBO9780511976667 – year: 2010 ident: ref10 article-title: A brief introduction of quantum cryptography for engineers – ident: ref43 doi: 10.1038/nphoton.2009.230 – ident: ref6 doi: 10.1109/MSP.2015.11 – ident: ref20 doi: 10.1007/BF00191318 – ident: ref39 doi: 10.1103/PhysRevA.72.012326 – ident: ref36 doi: 10.1109/ISIT.2004.1365172 – ident: ref34 doi: 10.1103/PhysRevA.84.042331 – ident: ref16 doi: 10.1109/T-AIEE.1926.5061224 – ident: ref21 doi: 10.1103/PhysRevA.51.1863 – ident: ref13 doi: 10.1103/RevModPhys.81.1301 – ident: ref18 doi: 10.1364/OE.23.007583 – ident: ref22 doi: 10.1088/1367-2630/4/1/344 – ident: ref28 doi: 10.1103/PhysRevA.65.012312 – ident: ref24 doi: 10.1103/PhysRevA.69.012309 – ident: ref40 doi: 10.1103/PhysRevLett.94.230503 – ident: ref38 doi: 10.1103/PhysRevLett.94.230504 – volume: 400 start-page: 239 year: 1999 ident: ref27 article-title: Seeing a single photon without destroying it publication-title: Nature doi: 10.1038/22275 – ident: ref5 doi: 10.1103/PhysRevA.61.052304 – ident: ref37 doi: 10.1103/PhysRevLett.91.057901 – ident: ref7 doi: 10.1109/ACCESS.2015.2399101 – year: 2005 ident: ref42 article-title: Enhancing practical security of quantum key distribution with a few decoy states – ident: ref19 doi: 10.1364/OE.22.021739 – ident: ref12 doi: 10.1103/RevModPhys.74.145 – year: 2015 ident: ref2 publication-title: Quantum Hacking Lab – year: 2015 ident: ref3 publication-title: Quantum Key Distribution Stan-dards – ident: ref30 doi: 10.1140/epjd/e2010-00103-y – ident: ref31 doi: 10.1038/nphoton.2009.231 – start-page: 175 year: 1984 ident: ref15 article-title: Quantum cryptography: Public key distribution and coin tossing publication-title: Proc IEEE Int Conf Comput Syst Signal Process – ident: ref29 doi: 10.1038/25059 – ident: ref8 doi: 10.1177/1548512915588572 – volume: 36 start-page: 199 year: 2015 ident: ref9 article-title: Test and evaluation of complex cyber security systems: A case study in using modeling and simulation to more efficiently understand, test, and evaluate the security of quantum key distribution systems publication-title: ITE J – year: 2005 ident: ref35 publication-title: Introductory Quantum Optics – ident: ref44 doi: 10.1109/MCOM.2015.7295459 – ident: ref25 doi: 10.1103/PhysRevLett.92.057901 – ident: ref14 doi: 10.1145/1008908.1008920 |
SSID | ssj0000816957 |
Score | 2.1553566 |
Snippet | Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure... |
SourceID | doaj proquest crossref ieee |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 2188 |
SubjectTerms | Bit error rate Cryptography Decoy State Protocol Eavesdropping Gain measurment Keying Modelling Photon number splitting Photon Number Splitting Attack Photonics Photons Protocols Quantum cryptography Quantum Key Distribution Quantum mechanics Qubits (quantum computing) Splitting |
SummonAdditionalLinks | – databaseName: IEEE Xplore dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VnuDAqyAWCvKBY7N1N3ZsH5cVqwqJCqlU6s3yYyIQsIsge4Bfz4zjjXgJcYsiO3Iy4_gbe-b7AJ6T06ALbWp071jCLDHlbasapWTuY7Y6x8L2edGdX6lX1_r6AE6mWhhELMlnOOfLcpaft2nHW2WnhuE6M0feoMBtrNWa9lNYQMJpU4mFzqQ7Xa5W9A6cvdXNCTizEuUvi0_h6K-iKn_8icvysr4Dr_cDG7NKPsx3Q5yn779xNv7vyO_C7YozxXJ0jHtwgJv7cOsn9sEjWJd0AcFqaFyTLsImi8v3n6qelxi2gpMMv4k377YEEMVF0Q4Rl4RaS660WA4DF-g_gKv1y7er86bKKjRJSTs06Ixc5GhjZ1VUrbTYBrOIZ8li7ILtdELChDIlimQ04RNHIEyh7ZEadc7k9iEcbrYbfATC9TlQvEaope2Vpt4xYsAQsjTJKW1nsNh_b58q5zhLX3z0JfaQzo9G8mwkX400g5Op0-eRcuPfzV-wIaemzJddbpABfJ1-3hFyJeiYXRuSygRrjdWhJyiIJhMkTTM4YqNND6n2msHx3i18ndtf_UJRFKY6qczjv_d6Ajd5gONGzTEcDl92-JSgyxCfFZ_9AWQg6WA priority: 102 providerName: IEEE |
Title | Using Modeling and Simulation to Study Photon Number Splitting Attacks |
URI | https://ieeexplore.ieee.org/document/7456202 https://www.proquest.com/docview/2455946047 https://doaj.org/article/9045324d93ac4d019785af441e7d416c |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NS8QwEA3iSQ_iJ66ukoNHq9k2aZLjuriIBxF0wVvIV1HQXdF68N87k2aXFUEvXkvSNpNp5k06eY-QE3CaqG3lC9FolDDzSHlb8YJzFhoXlAgusX3e1FcTfv0gHpakvrAmrKMH7gx3rgFzQNAPurKeBwAkUgnbQBCPMgCY8Lj6QsxbSqbSGqwGtRYy0wwNmD4fjkYwIqzlqs8ARqMu5bdQlBj7s8TKj3U5BZvxJtnIKJEOu7fbIitxuk3Wl7gDd8g4_eynqGWGJ8qpnQZ69_SS1bhoO6NYIvhJbx9nAO_oTVL-oHeAOVOlMx22LR6v3yWT8eX96KrIogiF50y1RdSSlcEpVyvueMVUrKws3cCr6GqrauEjIDrmPeQhAtCFBgjFo2oiNKq1DNUeWZ3OpnGfUN0EC9kWYI6q4QJ6OxdttDYw6TUXqkfKuX2Mz4zhKFzxbFLmwLTpjGrQqCYbtUdOF51eO8KM35tfoOEXTZHtOl0AHzDZB8xfPtAjOzhti5tITOtY2SP9-TSa_GW-m5JDDsVrxuXBfzz6kKzhcLpNmT5Zbd8-4hHAlNYdJ488TicKvwA5cN_u |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwzV3LbtQwFL0qZQEsKFAQAwW8gB2Zuokd2wsWw8BoSssIqa3UnfErAgEziGZUtd_Cr_BvvXY8ES-xq8QuinytxD6xj53rcwCeImiCMpUreKOihZmLkrcVKxijvrFecm-T2uesnh6xN8f8eA2-92dhQggp-SwM42X6l-8Xbhm3yrZFpOu0zCmUe-HsFBdoJy92X2FvPivLyevD8bTIHgKFY1S2RVCClt5KW0tmWUVlqIwo7Y6TwdZG1twFJEDUOaTtHCdjhYyDBdkELFQr4Sus9wpcRZ7By-50WL-DEy0rFBdZymiHqu3ReIytFvPF6iFS9eh9-ct0l1wBso3LH2N_mtAmG_Bj1RRdHsun4bK1Q3f-m0rk_9pWt-BmZtJk1EH_NqyF-R248ZO-4iZMUkIEiX5v8dQ9MXNPDj5-yY5lpF2QmEZ5Rt59WCAFJrPkjkIOkJenbHAyatsoQXAXji7lRe7B-nwxD_eBqMYbXJEiL6saxjHa2mCCMZ4KpxiXAyhX_atdVlWP5h6fdVpdUaU7UOgICp1BMYDnfdDXTlTk38VfRuD0RaMieLqBHa7zAKMVcnMkx15VxjGPxF1Ibhoku0F4JN1uAJsRJH0lGR8D2FrBUOfR60SXiHbFasrEg79HPYFr08O3-3p_d7b3EK7Hh-22pbZgvf22DI-QqLX2cfpeCLy_bNBdAFHPRVY |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+Modeling+and+Simulation+to+Study+Photon+Number+Splitting+Attacks&rft.jtitle=IEEE+access&rft.au=Mailloux%2C+Logan+O.&rft.au=Hodson%2C+Douglas+D.&rft.au=Grimaila%2C+Michael+R.&rft.au=Engle%2C+Ryan+D.&rft.date=2016&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=4&rft.spage=2188&rft.epage=2197&rft_id=info:doi/10.1109%2FACCESS.2016.2555759&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2016_2555759 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |