Skip to main content
Log in

On the vulnerability of the swiss system of coherent quantum cryptography to an attack with repeated measurements

  • Quantum Information Science
  • Published:
JETP Letters Aims and scope Submit manuscript

Abstract

It has been shown that the coherent quantum cryptography protocol (Coherent One Way) and, correspondingly, fiber optic systems involving this protocol for quantum key distribution, are vulnerable to an attack with repeated measurements and do not guarantee the security of distributed keys in a communication channel with losses. The coherent quantum cryptography system is used in Switzerland as one of the key distribution channels in the framework of the network project SECOQC (SEcure COmmunications based on Quantum Cryptography). A critical attack with repeated measurements was missed when the cryptographic strength of this protocol was analyzed. The critical length of the communication channel has been determined; this is a value above which secure key distribution is certainly impossible. Beginning with the critical length, an eavesdropper knows the entire distributed key, does not introduce errors at the receiver end, and remains undetected. For typical parameters in a real system (the average photon number μ = 0.5 and the quantum efficiency of avalanche detectors η = 0.1, see N. Gisin, G. Ribordy, H. Zbinden, et al., arXiv:quant-ph/0411022 and D. Stucki, C. Barreiro, S. Fasel, et al., arXiv:quant-ph/08095264), the security of keys cannot be guaranteed even for a communication channel whose length is as small as wished.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, et al., Rev. Mod. Phys. 81, 1301 (2009).

    Article  ADS  Google Scholar 

  2. G. Brassard, N. Lütkenhaus, T. Mor, and B. Sanders, Phys. Rev. Lett. 85, 1330 (2000).

    Article  ADS  Google Scholar 

  3. W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003).

    Article  ADS  Google Scholar 

  4. V. Scarani, A. Acein, G. Ribordy, and N. Gisin, Phys. Rev. Lett. 95, 057901-1 (2004); A. Acin, N. Gisin, and V. Scarani, arXiv:quant-ph/0302037.

    ADS  Google Scholar 

  5. D. A. Kronberg and S. N. Molotkov, Zh. Eksp. Teor. Fiz. 136, 650 (2009) [J. Exp. Theor. Phys. 109, 557 (2009)].

    Google Scholar 

  6. N. Gisin, G. Ribordy, H. Zbinden, et al., arXiv:quant-ph/0411022.

  7. SECOQC, arXiv:quant-ph/0701168.

  8. D. Stucki, N. Brunner, N. Gisin, et al., arXiv:quant-ph/0506097.

  9. C. Branciard, N. Gisin, N. Lütkenhaus, and V. Scarani, arXiv:quant-ph/0609090.

  10. C. Branciard, N. Gisin, and V. Scarani, arXiv:quant-ph/0710.4884.v2.

  11. D. Stucki, C. Barreiro, S. Fasel, et al., arXiv:quant-ph/08095264.

  12. M. Curty, L.-L. Zhang, H.-K. Lo, and N. Lütkenhaus, arXiv:quant-ph/0609094.

  13. K. Inoue, E. Waks, and Y. Yamamoto, Phys. Rev. Lett. 89, 037902 (2002); K. Inoue, E. Waks, and Y. Yamamoto, Phys. Rev. A 68, 022317 (2003).

    Article  ADS  Google Scholar 

  14. H. Takesue, S. W. Nam, Q. Zhang, et al., Nature Photon. 1, 343 (2007).

    Article  ADS  Google Scholar 

  15. K. Kraus, States, Effects and Operations (Springer, Berlin, 1983).

    Book  MATH  Google Scholar 

  16. M. Nielsen and I. Chuang, Quantum Computation and Quantum Information (Cambridge Univ., Cambridge, 2001; Mir, Moscow, 2006).

    Google Scholar 

  17. A. Peres, Quantum Theory: Concepts and Methods (Kluwer Acad., The Netherlands, 1995).

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

Original Russian Text © S.N. Molotkov, 2011, published in Pis’ma v Zhurnal Eksperimental’noi i Teoreticheskoi Fiziki, 2011, Vol. 93, No. 3, pp. 194–201.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Molotkov, S.N. On the vulnerability of the swiss system of coherent quantum cryptography to an attack with repeated measurements. Jetp Lett. 93, 178–185 (2011). https://doi.org/10.1134/S0021364011030118

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0021364011030118

Keywords

Navigation