DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Rhee, June-Koo | - |
dc.contributor.advisor | 이준구 | - |
dc.contributor.author | Ko, Heasin | - |
dc.contributor.author | 고해신 | - |
dc.date.accessioned | 2017-03-29T02:38:44Z | - |
dc.date.available | 2017-03-29T02:38:44Z | - |
dc.date.issued | 2016 | - |
dc.identifier.uri | http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=649577&flag=dissertation | en_US |
dc.identifier.uri | http://hdl.handle.net/10203/221786 | - |
dc.description | 학위논문(석사) - 한국과학기술원 : 전기및전자공학부, 2016.2 ,[vi, 37 p. :] | - |
dc.description.abstract | Quantum key distribution (QKD) is a field of secure communication, whose security is unconditionally guaranteed by the law of quantum physics. With the proposal of BB84 protocol, security proofs and theoretical principles regarding QKD have been structured with extensive studies. Recently, several successful demonstrations of QKD and advents of commercial systems give expectations of useful QKD applications for the general public in near future. However, lots of concerns regarding unconditional security still exist because security proofs of QKD are based on an ideal QKD system model, which does not reflect imperfection of practical implementations. In fact, it makes fatal loopholes which allow potential eavesdroppers to obtain information shared between authenticated users. Since device imperfection is inevitable with current technologies, studies on possible attacks exploiting the imperfection have been largely spotlighted. Fortunately, most of revealed loopholes turned out to be closed in simple ways. In this paper, we propose a special trojan-horse attack model called a hidden pulse attack exploiting spectral characteristics of optical components used in a plug-and-play QKD system. In a plug-and-play QKD system, the sender monitors power of incoming pulses using a photodiode to find out potential eavesdropping attack from unauthenticated third parties. However, a photodiode may not be able to detect some wavelength components because spectral quantum efficiency of a photodiode extremely decreases in some spectral region. Thus, an eavesdropper can get information regarding modulation condition of the sender by transmitting extra pulses at undetectable spectral region. We modeled eavesdropping attack exploiting aforementioned fact for two different cases. One is the case where Eve can utilize a wavelength where quantum efficiency of the photodiode is zero. The other is the case where Eve only can utilize a wavelength with non-zero quantum efficiency due to filtering components. Security performance of the QKD system in terms of secret key rate and transmission distance is informatically analyzed for both cases. Theoretical results showed that the performance of decoy-state BB84 protocol is enormously diminished for both cases under this attack. | - |
dc.language | eng | - |
dc.publisher | 한국과학기술원 | - |
dc.subject | quantum key distribution | - |
dc.subject | quantum hacking | - |
dc.subject | plug-and-play system | - |
dc.subject | Hidden pulse | - |
dc.subject | trojan-horse attack | - |
dc.subject | 양자키분배 | - |
dc.subject | 양자해킹 | - |
dc.subject | 플러그 앤 플레이 시스템 | - |
dc.subject | 숨겨진 펄스 | - |
dc.subject | 트로이안 공격 | - |
dc.title | Hidden pulse attack model in plug-and-play quantum key distribution system | - |
dc.title.alternative | 플러그 앤 플레이 양자 키 분배 시스템에서의 숨겨진 펄스 공격 연구 | - |
dc.type | Thesis(Master) | - |
dc.identifier.CNRN | 325007 | - |
dc.description.department | 한국과학기술원 :전기및전자공학부, | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.