Skip to main content
Log in

Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Quantum key distribution (QKD) is an effective technique to share unconditional secure keys among a pair of legal distant users with the existence of eavesdroppers. It depends upon quantum mechanics that exhibits the probability for an eavesdropper to acquire full information on the key is forbidden by the laws of physics. Though quantum mechanics assure the security of the QKD system, it is critical to inspect whether the imperfections can result in the revelation of sensitive data. The presence of imperfections can result in side-channel attacks and the ones relevant to single-photon detectors are crucial as it is adopted in several QKD approaches. For resolving these issues, this study develops a new Security in Quantum side Channel (SQSC) framework to accomplish security. The proposed SQSC approach involves the design of Shifting and Binary Conversions (SBC) algorithm with two sub-processes namely shifting process and binary conversion. Since none of the works have been developed quantum channel in the current system to secure data, the proposed model added complexity to the secret data (shifting process and binary conversion using SBC) before q-bit conversion. The design of SBC algorithm to resolve side-channel attacks and accomplish improved security shows the novelty of the work. In order to demonstrate the enhanced performance of the SQSC approach, a comparison study with existing model is performed. The experimental results reported the promising performance of the SQSC approach over the other existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

The datasets created during development and analyzed during this work can be found in the Image repository, http://www.vision.caltech.edu/Image_Datasets/Caltech101/ and Quantum bit repository, https://pure.strath.ac.uk/ws/portalfiles/portal/92638035/dataset.zip.

References

  • Aguado A et al (2020) Quantum cryptography networks in support of path verification in service function chains. J Opt Commun Netw 12(4):B9–B19. https://doi.org/10.1364/JOCN.379799

    Article  Google Scholar 

  • Basso Basset F, Valeri M, Roccia E, Muredda V, Poderini D, Neuwirth J, Spagnolo N, Rota MB, Carvacho G, Sciarrino F, Trotta R (2021) Quantum key distribution with entangled photons generated on demand by a quantum dot. Sci Adv 7(12):eabe6379

    Article  Google Scholar 

  • Bennett CH, Brassard G (2014) Quantum cryptography. Theor Comput Sci 560(P1):7–11

    Article  MATH  Google Scholar 

  • Bennett CH, Bessette F, Brassard G et al (1992a) Experimental quantum cryptography. J Cryptol 5:3–28. https://doi.org/10.1007/BF00191318

    Article  MATH  Google Scholar 

  • Bennett CH, Brassard G, Crépeau C, Skubiszewska MH (1992b) Practical Quantum Oblivious Transfer. In: Feigenbaum J (eds) Advances in Cryptology — CRYPTO ’91. CRYPTO 1991. Lecture Notes in Computer Science, vol 576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46766-1_29.

  • Boaron A, Boso G, Rusca D, Vulliez C, Autebert C, Caloz M et al (2018) Secure quantum key distribution over 421 km of optical fiber. Phys Rev Lett 121:190502

    Article  Google Scholar 

  • Brassard G, Lütkenhaus N, Mor T, Sanders BC (2000a) Limitations on practical quantum cryptography. Phys Rev Lett 85(6):1330

    Article  MATH  Google Scholar 

  • Brassard G, Lutkenhaus N, Mor T, Sanders BC (2000b) "Security aspects of practical quantum cryptography." In International conference on the theory and applications of cryptographic techniques, Springer, Berlin, Heidelberg, pp 289–299

  • Chaiwongkhot P, Kuntz KB, Zhang Y, Huang A, Bourgoin J-P, Sajeed S, Lütkenhaus N, Jennewein T, Makarov V (2019) Eavesdropper’s ability to attack a free-space quantum-key-distribution receiver in atmospheric turbulence. Phys Rev A 99(6):062315

    Article  Google Scholar 

  • Clivati C, Meda A, Donadello S, Virzì S, Genovese M, Levi F, Mura A, Pittaluga M, Yuan Z, Shields AJ, Lucamarini M (2022) Coherent phase transfer for real-world twin-field quantum key distribution. Nat Commun 13(1):1–9

    Google Scholar 

  • Grote O, Ahrens A, Benavente-Peces C (2021) Modelling and simulation of quantum key distribution using optsim. IEEE Microw Theory Tech Wirel Commun MTTW 2021:160–164. https://doi.org/10.1109/MTTW53539.2021.9607165

    Article  Google Scholar 

  • Jian L, Hengji L, Na W, Chaoyang L, Yanyan H, Xiubo C, Yuguang Y (2019) A quantum key distribution protocol based on the EPR pairs and its simulation. Int Conf Simul Tools Tech 295:288–301

    Article  Google Scholar 

  • Li J, YangYG, Chen XB, Zhou YH, Shi WM (2016) Practical quantum private database queries based on passive round-robin differential phase shift quantum key distribution. Sci Rep, 1–6.

  • Li S, Li L (2020) Round Shujing robin differential quadrature phase shift quantum key distribution by using odd coherent states. J Optik 227:165763

    Article  Google Scholar 

  • Li S, Li L (2021) Round robin differential quadrature phase shift quantum key distribution by using odd coherent states. Optik 227:165763

    Article  Google Scholar 

  • Lim CCW, Wang C (2021) Long-distance quantum key distribution gets real. Nat Photon 15:554–556. https://doi.org/10.1038/s41566-021-00848-1

    Article  Google Scholar 

  • Lopez D, Brito JP, Pastor A, Martin V, Sánchez C, Rincon D, Lopez V (2021) Madrid quantum communication Infrastructure: a testbed for assessing QKD technologies into real production networks. In: Dong P, Kani J, Xie C, Casellas R, Cole C, Li M (eds) Optical fiber communication conference (OFC) 2021, OSA technical digest (Optica Publishing Group, 2021), paper Th2A.4.

  • Lord A, White C, Salas EH (2021) Quantum Key distribution (QKD) and the quantum internet: the challenges facing this new technology, In: Dong P, Kani J, Xie C, Casellas R, Cole C, Li M (eds) Optical fiber communication conference (OFC) 2021 OSA technical digest (Optica Publishing Group, 2021), paper Th2A.1.

  • Lütkenhaus N, Jahma M (2002) Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J Phys 4(1):44

    Article  Google Scholar 

  • Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, Makarov V (2010a) Thermal blinding of gated detectors in quantum cryptography. Opt Express 18(26):27938–27954

    Article  Google Scholar 

  • Lydersen L, Wiechers C, Wittmann C et al (2010b) Hacking commercial quantum cryptography systems by tailored bright illumination. Nat Photon 4:686–689. https://doi.org/10.1038/nphoton.2010.214

    Article  Google Scholar 

  • Makarov V (2009) Controlling passively quenched single photon detectors by bright light. New J Phys 11(6):065003

    Article  Google Scholar 

  • Mao QP, Wang L, Zhao SM (2019) Decoy-state round-robin differential-phase-shift quantum key distribution with source errors 19(56): 1–12

  • Park D, Kim G, Heo D, Kim S, Kim H, Hong S (2021) Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures. ICT Express 7(1):36–40

    Article  Google Scholar 

  • Pinheiro PV, Pereira PC, Sajeed S, Horn RT, Bourgoin J-P, Jennewein T, Lütkenhaus N, Makarov V (2018) Eavesdropping and countermeasures for backflash side channel in quantum cryptography. Opt Express 26(16):21020–21032

    Article  Google Scholar 

  • Pirandola S, Andersen UL, Banchi L, Berta M, Bunandar D, Colbeck R, Englund D, Gehring T, Lupo C, Ottaviani C, Pereira JL, Razavi M, Shamsul Shaari J, Tomamichel M, Usenko VC, Vallone G, Villoresi P, Wallden P (2020) Advances in quantum cryptography. Adv Opt Photon 12:1012–1236

    Article  Google Scholar 

  • Pittman TB, Jacobs BC, Franson JD (2005) Heralding single photons from pulsed parametric down-conversion. Opt Commun 246(4–6):545–550

    Article  Google Scholar 

  • Pljonkin A, Petrov D, Sabantina L, Dakhkilgova K (2021) Nonclassical attack on a quantum key distribution system. Entropy 23(5):509

    Article  MathSciNet  Google Scholar 

  • Pljonkin AP (2021) Vulnerability of the synchronization process in the quantum key distribution system. In: Research Anthology on Advancements in Quantum Technology, pp 345–354. IGI Global.

  • Portmann C, Renato R (2021) "Security in quantum cryptography." arXiv preprint arXiv:2102.00021 .

  • Qian YJ, He DY, Wang S, Chen W, Yin ZQ, Guo GC, Han ZF (2019) Robust countermeasure against detector control attack in a practical quantum key distribution system. Optica 6(9):1178–1184

    Article  Google Scholar 

  • Ren S, Yang S, Wonfor A, White I, Penty R (2021) Demonstration of high-speed and low-complexity continuous variable quantum key distribution system with local local oscillator. Sci Rep 11(1):1–13

    Article  Google Scholar 

  • Sajeed S, Chaiwongkhot P, Bourgoin J-P, Jennewein T, Lütkenhaus N, Makarov V (2015) Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch. Phys Rev A 91(6):062301

    Article  Google Scholar 

  • Sidhu JS, Brougham T, McArthur D, Pousa RG, Oi DK (2022) Finite key effects in satellite quantum key distribution. NPJ Quantum Inf 8(1):1–11

    Article  Google Scholar 

  • Siva Lakshmi P, Murali G (2017) Comparison of classical and quantum cryptography using QKD simulator. In: International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017).

  • Smith G (2008) “Private classical capacity with a symmetric side channel and its application to quantum cryptography. Phys Rev 78(2)

  • Wang S, He DY, Yin ZQ, Lu FY, Cui CH, Chen W, Zhou Z, Guo GC, Han ZF (2019) Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system. Phys Rev X 9(2):021046

    Google Scholar 

  • Yan YF, Zhou L, Zhong W, Sheng YB (2021) Measurement-device-independent quantum key distribution of multiple degrees of freedom of a single photon. Front Phys 16(1):1–11

    Article  Google Scholar 

  • Yin ZQ, Wang S, Chen W, Li HW, Guo GC, Han ZF (2014) Reference-free-independent quantum key distribution immune to detector side channel attacks , Quantum Inf Process.

  • Zhang Z, Guangyuan Fu, Di F, Li C, Liu J (2019) Generative reversible data hiding by image-to-image translation via GANs. Secur Commun Netw 2019:1–11

    Article  Google Scholar 

  • Zhang Y, Coles PJ, Winick A, Lin J, Lütkenhaus N (2021) Security proof of practical quantum key distribution with detection-efficiency mismatch. Phys Rev Res 3(1):013076

    Article  Google Scholar 

  • Zhou F, Qu W, Wang J et al (2020) Twin-field quantum key distribution with heralded single photon source. Eur Phys J D 74:185. https://doi.org/10.1140/epjd/e2020-10219-0

    Article  Google Scholar 

Download references

Funding

The authors declare that no funding was received for this study.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization was contributed by N. Gopinath; Methodology was contributed by N.Gopinath; Formal analysis and investigation were contributed by N.Gopinath and Dr.S.Prayla Shyry; Writing—original draft preparation was contributed by N.Gopinath; Writing—review and editing was contributed by N.Gopinath; Resources were contributed by N.Gopinath and Dr.S.Prayla Shyry; Supervision was contributed by Dr.S.Prayla Shyry.

Corresponding author

Correspondence to N. Gopinath.

Ethics declarations

Conflict of interest

The authors have no applicable financial or non-financial interests to expose this article.

Ethical approval

Any of the authors' investigations with human participants or animals are not included in this article.

Informed consent

Any of the authors' investigations with human participants or animals are not included in this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gopinath, N., Shyry, S.P. Secured: quantum key distribution (SQKD) for solving side-channel attack to enhance security, based on shifting and binary conversion for securing data (SBSD) frameworks. Soft Comput 27, 13365–13372 (2023). https://doi.org/10.1007/s00500-022-07479-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-07479-w

Keywords

Navigation