Abstract
Security and integrity of the network and the traffic it carries is a key requirement in modem communication systems. Over the past twenty years, quantum key distribution (QKD) has gained world-wide attention. This is because security of its implementations is based on the impossibility, in principle, to reliably copy an a-priori unknown quantum state (no-cloning theorem). However, security also relies on the assumption that electrooptical devices which are part of quantum cryptosystems do not deviate from model assumptions made to establish security proofs. This second range of security threats, which target component imperfections, has already been successfully exploited by one of the authors to take control of commonly used single photon detectors, namely InGaAs-based modules at telecom wavelengths [1] and Silicon-based passively-quenched modules in the visible - near infrared range [2].
© 2009 IEEE
PDF ArticleMore Like This
N. Jain, L. Lydersen, C. Wittmann, C. Wiechers, D. Elser, Ch. Marquardt, V. Makarov, and G. Leuchs
CI3_4 The European Conference on Lasers and Electro-Optics (CLEO/Europe) 2011
G. S. Kanter
JW2A.7 CLEO: Applications and Technology (CLEO:A&T) 2015
Yi Zhao, Bing Qi, and Hoi-Kwong Lo
ITuI3 International Quantum Electronics Conference (IQEC) 2009