Comments on the Generalized KJLN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security
In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG) introduce a
new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 …
new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 …
Laser-seeding attack in quantum key distribution
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure
distribution of secret keys over an insecure channel. Unfortunately, imperfect …
distribution of secret keys over an insecure channel. Unfortunately, imperfect …
Laser-damage attack against optical attenuators in quantum key distribution
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …
prepare weak coherent states in the source. Their mean photon number must be …
Transient attacks against the Kirchhoff–Law–Johnson–Noise (KLJN) secure key exchanger
We demonstrate the security vulnerability of an ideal Kirchhoff–Law–Johnson–Noise key
exchanger against transient attacks. Transients start when Alice and Bob connect a wire to …
exchanger against transient attacks. Transients start when Alice and Bob connect a wire to …
Ability of strong-pulse illumination to hack self-differencing avalanche photodiode detectors in a high-speed quantum-key-distribution system
B Gao, Z Wu, W Shi, Y Liu, D Wang, C Yu, A Huang… - Physical review A, 2022 - APS
Implementation of high-speed quantum key distribution (QKD) has become one of the major
focuses in the field, which produces a high key-generation rate for applications. To achieve …
focuses in the field, which produces a high key-generation rate for applications. To achieve …
Implementation security in quantum key distribution
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
[HTML][HTML] An approach for security evaluation and certification of a complete quantum communication system
Although quantum communication systems are being deployed on a global scale, their
realistic security certification is not yet available. Here we present a security evaluation and …
realistic security certification is not yet available. Here we present a security evaluation and …
[HTML][HTML] Nonclassical attack on a quantum key distribution system
A Pljonkin, D Petrov, L Sabantina, K Dakhkilgova - Entropy, 2021 - mdpi.com
The article is focused on research of an attack on the quantum key distribution system and
proposes a countermeasure method. Particularly noteworthy is that this is not a classic …
proposes a countermeasure method. Particularly noteworthy is that this is not a classic …
Loopholes in the 1500–2100-nm Range for Quantum-Key-Distribution Components: Prospects for Trojan-Horse Attacks
B Nasedkin, F Kiselev, I Filipov, D Tolochko… - Physical Review …, 2023 - APS
Vulnerabilities of components used in quantum-key-distribution systems affect its
implementation security and must be taken into consideration during system development …
implementation security and must be taken into consideration during system development …
Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination
Quantum key distribution (QKD) has been proved to be information-theoretically secure in
theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to …
theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to …