Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Thermal blinding of gated detectors in quantum cryptography

Open Access Open Access

Abstract

It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [Nat. Photonics 4, 686 (2010)]. This allows for an attack eavesdropping the full raw and secret key without increasing the quantum bit error rate (QBER). Here we show how thermal effects in detectors under bright illumination can lead to the same outcome. We demonstrate that the detectors in a commercial QKD system Clavis2 can be blinded by heating the avalanche photo diodes (APDs) using bright illumination, so-called thermal blinding. Further, the detectors can be triggered using short bright pulses once they are blind. For systems with pauses between packet transmission such as the plug-and-play systems, thermal inertia enables Eve to apply the bright blinding illumination before eavesdropping, making her more difficult to catch.

© 2010 Optical Society of America

1. Introduction

In theory quantum mechanics allows two parties, Alice and Bob, to grow a private, secret key, even if the eavesdropper Eve can do anything permitted by the laws of nature [14]. The field of quantum key distribution (QKD) has evolved rapidly in the last two decades, with transmission distance increasing from a table top demonstration to over 250km in the laboratory [5], and commercial QKD systems available from several vendors [6].

However the components used for the experimental realizations of QKD have imperfections. As for any security technology, it is crucial to scrutinize the implementations in order to obtain a high level of practical security. The discovery of security loopholes does not prove that QKD is insecure, but rather that principles of QKD are not sufficiently well implemented.

Numerous imperfections have been addressed in security proofs [712]. For some loopholes it took several years from their discovery until they were covered by security proofs, for instance the Trojan-horse [13, 14] loophole and detector efficiency mismatch [1517]. The latter was exploited in the time-shift attack [18] on a commercial QKD system [19]. Other loopholes include a variety of side-channels [2023].

Common to the loopholes mentioned so far is that the corresponding attacks are not implementable in practice, leave Eve with a probabilistic advantage, or introduce a QBER close to the tolerable limit. For instance, the implementation of the time-shift attack [19] gave Eve a probabilistic, information-theoretic advantage. With probability 0.04 the unconditional security is broken; however, extra information is needed and a nontrivial computational task remains to obtain the secret key. In the practical phase-remapping attack [23], Eve caused 19.7% QBER [24] compromising the rarely used two-way post-processing protocol which produces secure key at QBER up to 20% [25, 26].

There is however one class of attacks which stands out in terms of implementability, Eve’s information and QBER: The blinding attacks [2729] are fully implementable with current technology, and give Eve the whole raw key while causing zero additional QBER. The latter is essential as the QBER is measured to reveal Eve’s presence. In these attacks, the APDs are tricked to exit the single-photon sensitive Geiger mode, and are so-called blind. Eve uses a copy of Bob’s apparatus to detect Alice’s signals, but resends bright trigger pulses instead of single photons, as in the after-gate attack [30]. When the detectors are blind, Bob will only detect the bright trigger pulses if he uses the same basis as Eve. Otherwise his detectors remain silent. Hence Eve gets a full copy of the raw key while causing no additional QBER. Both passively quenched detectors [27], actively quenched detectors [28] and the gated detectors of two commercially available QKD systems [29] have been shown to be vulnerable to blinding. In the case of the passively-quenched detectors, this loophole has been exploited in the first full-scale implementation of an eavesdropper [31], which was inserted in the middle of the 290m transmission line in an experimental entanglement-based QKD system [32, 33], and recovered 100% of the raw key.

Previously the gated detectors in the commercially available system Clavis2 from manufacturer ID Quantique were subject to continuous-wave (CW) blinding [29]. The blinding illumination caused the bias voltage at the APDs to drop due to the presence of DC impedance of the bias voltage supply, and therefore the APDs were never in Geiger mode. Shortly after the result was published, Yuan et al. proposed that removing the bias voltage impedance or lowering the comparator threshold in the detectors would hinder blinding in gated detectors [34]. However, in this paper we show how the same detectors, regardless of the impedance of the bias voltage supply, can be blinded by heating the APD, so-called thermal blinding. Furthermore we show how the AC-coupling of the detectors allows a blinding technique which may blind the detectors even if the comparator threshold is lowered. We show that thermal blinding is more sophisticated form of attack than previously reported CW-blinding [29] because the APD can be heated well in advance of the detection times, and is as such harder to catch. Especially for Clavis2, all the detector parameters such as temperature of the cold plate, bias voltage and APD current indicate single photon sensitivity while the detectors are in fact blind.

In this paper we first briefly review how APDs in the linear mode can be exploited to eavesdrop on QKD systems (Section 2). Then the detector design in Clavis2 is discussed (Section 3) before we show how it is possible to thermally blind and trigger the detectors (Section 4). Finally we briefly discuss countermeasures in Section 5 and conclude in Section 6.

2. Eavesdropping exploiting APDs in linear mode

In this section we briefly review how APDs in the linear mode can be exploited to eavesdrop on QKD systems [28, 29].

In Geiger mode operation, an electron-hole pair produced by an absorbed single photon is amplified to a large current in the APD, which exceeds a current comparator threshold and reveals the photon’s presence. This is referred to as a click [35].

In the linear mode however, when an APD is reverse-biased at a constant voltage below the breakdown voltage [36], the current through the APD is proportional to the incident optical power. Usually the APD is placed in a resistive network, and also has an internal resistance. Hence, the current through the APD lowers the bias voltage, and the current through the APD is monotonically increasing with the incident optical power. In this regime, the comparator current threshold translates to a classical optical power threshold [29].

If APDs are used as detectors in a QKD system, and they are optically accessible to Eve when biased under the breakdown voltage, Eve may eavesdrop on the QKD system with an intercept-resend (faked-state [37]) attack. Eve uses a copy of Bob to detect the qubits from Alice in a random basis. Eve resends her detection results, but instead of sending single photons she sends bright pulses, just above the classical optical power threshold. Bob will only have a detection event if his basis choice coincides with Eve’s basis choice (see Fig. 1), otherwise no detector clicks.

 figure: Fig. 1

Fig. 1 The last beam splitter (BS) as well as the detectors in a phase-encoded QKD system. I0 and I1 is the current running through APD 0/1, and Ith is the comparator threshold current above which the detector registers a click. Here we assume that the APDs are in the linear mode, and that Eve sends a bright pulse slightly above the optical power thresholds. a) Eve and Bob have selected matching bases. Therefore the full intensity in the pulse from Eve hits detector 0. The current caused by Eve’s pulse crosses the threshold current and causes a click. b) Eve and Bob have selected opposite bases. Therefore half the intensity of Eve’s pulse hits each detector (corresponding to 50% detection probability in either detector for single photons). This causes no click as the current is below the threshold for each detector.

Download Full Size | PDF

After the raw key exchange, Bob and Eve are identical both in bit values and basis choices. Since Eve uses a copy of Bob’s detectors, Bob’s photon-number detection statistics is equal with or without Eve. Therefore the attack works equally well on the BB84 protocol [1], the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) [38] and decoy-state BB84 protocols [3941]. In addition to attacking the quantum channel, Eve listens on the classical channel between Alice and Bob. Afterwards Eve performs the same classical post-processing as Bob to obtain the identical secret key.

Note that the classical optical power threshold has to be sufficiently well defined for successful perfect eavesdropping. To be precise, let an optical power of P100%,i or greater always cause a click when applied to detector i. Likewise, let an optical power of P0%,i or less never cause a click when applied to detector . The sufficient condition for Eve to be able to make any single i detector click while none of the other detectors click, can be expressed as

maxi{P100%,i}<2(mini{P0%,i}).

Note that since Alice and Bob openly report the failure due to too high QBER, it is unnecessary for Eve to know the classical optical thresholds P0%,i, P100%,i beforehand. In particular, she could start with a high optical power, lowering it each time the protocol fails until it succeeds. Then she knows that she has found the proper trigger pulse power. Note that to avoid causing the protocol to fail, she could probe just a part of the transmission [37].

3. Detector design

3.1. Detector circuit

Figure 2 shows an equivalent detector bias and comparator circuit diagram for the detectors in Clavis2, based on reverse engineering. The system ships with factory settings for the detectors, ready for QKD, which we used. The APD is biased just above its breakdown voltage by the high voltage supply VHV,0 = −42.89V, VHV,1 = −43.08V. On top of this bias the APD is gated with 2.8ns TTL pulses every 200ns from DD1 to create Geiger mode gates. The gates are applied as PECL signals from the mainboard, and the buffer converts them to TTL levels, 0V and approximately 3V. The anode of the APD is AC-coupled to a fast comparator DA1 with the thresholds Vth,0 = 78mV and Vth,1 = 82mV.

 figure: Fig. 2

Fig. 2 Equivalent detector bias and comparator circuit. Taps T1-T3 are analog taps of the APD gates (Vgate,0/1), the APD bias (Vbias,0/1) and the comparator input (Vcomp,0/1). The digital tap T4 of the detector output (Vclick,0/1) has been converted to logic levels in all oscillograms. For the experiments presented in section 4, the resistor R3 has been shorted.

Download Full Size | PDF

The normal operation of the detector circuit can be seen in Fig. 3. A number of techniques have been developed for compensating the capacitive pulse through APDs in the absence of an avalanche [4245], but this particular detector simply sets the comparator thresholds above the amplitude of the capacitive pulse.

 figure: Fig. 3

Fig. 3 An example of electrical signals during two gates in detector 1 without any illumination. In the first gate thermal fluctuations or trapped carriers have caused an avalanche, and a click at the comparator output (dark count). A typical amplitude of the avalanche peak is 200mV for detector 0 and 300mV for detector 1. Normally the system removes 50 gates after a detection event, but for this oscillogram this feature has been disabled. In the second gate there is no detection event. When no current runs through the APD, it is equivalent to a capacitor, and thus approximately the derivative of the gate pulse shape propagates to the comparator input, with peak positive amplitude ≈ 35mV.

Download Full Size | PDF

As a side note, applying CW illumination to the APD allowed us to measure the timing of the quantum efficiency curve within the gate quite precisely, see Appendix B.

3.2. Detector cooling

To reduce the probability of dark counts, APDs are usually cooled to a low temperature. The two APDs in this QKD system are cooled together by one 4-stage thermoelectric cooler (TEC) (Osterm PE4-115-14-15 [46]). The system software reports the temperature measured by a thermistor mounted on the cold side of the top stage (cold plate), and close to where the APDs are mounted. Note that the cold plate temperature is not always the same as the APD chip temperature, as there is actually a quite substantial thermal resistance between the two. This will become an important point in section 4.2. The hot side of the TEC is mounted on a large heatsink with a fan, such that it stays at approximately room temperature.

The temperature of the cold plate is maintained at a pre-set value by a closed-loop controller that adjusts the TEC current. When the system is switched on, the cold plate (and thus the APDs) is first cooled to the target temperature, −50°C. The system will not start operation unless the cold plate settles at a temperature below −49.8 °C. After this the temperature controller always tries to maintain the target temperature. However, there seems to be no alarm: QKD proceeds even if the cold plate temperature is several tens of degrees different from the target temperature.

4. Blinding and control

Blinding is achieved when the system is insensitive to single photons. This can be achieved by ensuring that the APD bias voltage is below the breakdown voltage, or by lowering the voltage in front of the comparator such that the avalanche current does not cross the comparator threshold. The detectors are controllable if they are accessible to Eve in the linear mode with a sufficiently well defined classical optical power click threshold, as in Eq. (1).

We have previously reported that blinding Clavis2 can be achieved by CW illumination due to the bias voltage supply impedance R3 = 1kΩ, which makes the bias voltage drop to a level where the APD is never in Geiger mode [29], even inside the gate.

One fast and easy countermeasure could be to use a low-impedance bias voltage source in the detectors. Therefore, in this paper we consider a modified version of the detectors with R3 shorted (see Fig. 2). We present three different blinding techniques which may be used against detectors with a low-impedance bias voltage source, and show that the detectors can be controlled by trigger pulses in the blind state. The technique in section 4.1 clearly works against high-impedance biased detectors as well as against low-impedance biased detectors since it has been demonstrated [29]. The difference is that with a low-impedance bias voltage source, the blinding originates from thermal effects instead of bias voltage drop. The technique in section 4.2 has been used on low-impedance biased detectors, but we see no reason why it should not work similarly well against the unmodified high-impedance biased detectors. The technique in section 4.3 has been used on both high- and low-impedance biased detectors, but we only present the results for the low-impedance biased detectors in this paper.

4.1. Thermal CW-blinding

It turns out that it is possible to blind also low-impedance biased detectors (R3 = 0) by CW illumination. When an APD is illuminated, the power dissipated in the APD is transformed to heat, which may increase the APD temperature. The breakdown voltage is temperature dependent: increasing the temperature increases the breakdown voltage [47, 48]. Since the bias voltage is constant, this makes the APD leave the Geiger mode. Two effects contribute to the power dissipation: electrical heating (VAPD · IAPD) and the small contribution by the absorption of the optical power. For the heat dissipation calculations, we simply assume that all the optical power is absorbed and transformed to heat. Figure 4 shows how the heat dissipation increases with the optical illumination.

 figure: Fig. 4

Fig. 4 Calculated heat dissipation (based on measured APD current and voltage) versus the optical illumination for each of the two detectors.

Download Full Size | PDF

When the sum of the heat dissipations of the two detectors is approximately 300mW, the cooling system is running at its maximum capacity with a TEC current of about ITEC = 2.37A (the air temperature at the heatsink fan intake at this time was 23.6 °C). When the optical illumination is increased beyond this point, the cold plate (and thus APD) temperature starts to increase. Figure 5 shows how the temperature of the cold plate increases with the total amount of heat dissipated in the APDs. When the optical illumination, and thus the load is increased beyond the maximum capacity of the TEC, the cold plate temperature increases approximately linearly with the heat dissipated by the APD. While not in the specifications of this specific TEC [46], other data sheets of similar TECs [49] show that the temperature difference between the hot and cold plate decreases linearly with respect to the load, given a constant TEC current.

 figure: Fig. 5

Fig. 5 The temperature of the cold plate and TEC current reported by the software, versus the total amount of heat dissipated in the APDs. It takes several minutes for the cold plate temperature to stabilize at a new value (hotter than −50°C) after the power dissipation in the APDs is changed.

Download Full Size | PDF

When the temperature of the APDs increases, the breakdown voltage also increases with the coefficient of about 0.1V/K [50]. In this experiment we illuminated both detectors simultaneously, to get sufficient temperature increase without risking a permanent damage to the APDs. We used a fibre-optic coupler (see appendix A for the experimental setup) to illuminate both detectors, with 46.75%/53.25% of the optical power going to detector 0/1. This is approximately equal to the measured splitting ratio for the beam splitter in front of the detectors in the system, when illuminated through the short arm of the interferometer [5153].

Figure 6 shows the click probability versus the CW illumination of the two detectors. The click probability drops below the normal dark count probability (about 10−4), before it becomes exactly zero when the illumination exceeds 8.8mW and 10mW at the detectors. In the experiment the blinding caused clicks for several minutes before the APDs were properly heated. However, the blinding only needs to be turned on once, afterwards Eve remains undetected.

 figure: Fig. 6

Fig. 6 Click probability versus power of CW illumination applied to both detectors simultaneously.

Download Full Size | PDF

After the cold plate has been heated by APD illumination, it takes several tens of seconds before it cools to the target temperature of −50°C. Therefore, the detectors stay blind for some time after the CW blinding illumination is turned off. Detectors 0 and 1 regain dark counts when the cold plate (and thus the APDs) becomes colder than −39.8 °C and −40.1°C, respectively.

To verify that the detectors could be controlled, the detectors were blinded with 9.5mW at detector 0 and 10.7mW at detector 1, and controlled by superimposing a 3ns long laser pulse slightly after the gate. The click probability thresholds are listed in Table 1. The thresholds satisfy Eq. (1), and thus the eavesdropping method described in Section 2 should be possible when the detectors are thermally blinded by CW illumination.

Tables Icon

Table 1. Control pulse peak power at 0 % and 100 % click probability thresholds, in CW thermal blinding mode

After observing thermal blinding in this experiment, we realized that this could be the reason why the PerkinElmer SPCM-AQR actively-quenched detector module remained blind at bright pulse frequencies above 400kHz, despite no substantial bias voltage drop [28]. Therefore we did more precise measurements which confirm that PerkinElmer SPCM-AQR can be thermally blinded [54].

4.2. Thermal blinding of frames

As this QKD system is of plug-and-play type, it sends the qubits in packets called frames to avoid Rayleigh back-scattered photons to arrive during the gates and increase the QBER [51, 55]. For our experiment we used 1072 qubits per frame [56]. With a 200ns bit period this makes the frame length 214.4 μs. The break in between the frames varies with the fibre length between Alice and Bob, but is always longer than the frame itself. In our experiment we simply used a 250μs frame break, which makes a total frame + break period of 464.4 μs.

It turns out that the APD chip and the inner parts immediately touching it (not the APD package and not the cold plate) act as a thermal reservoir on the frame period time scale. Therefore bright illumination between the frames heats the APD sufficiently that it stays blind throughout the whole frame. Based on the optical power where the frames went blind, and the average current through the APDs, the thermal resistance between each APD chip and the cold plate is estimated to be at least 190K/W.

To heat the APDs we used 225μs long pulses timed in between the frames and fired at both APDs simultaneously. The whole frame went blind at approximately 1.5mW and 1.7mW pulse power at detector 0 and 1 respectively. The oscillograms in Fig. 7 show the electrical and optical signals in detector 1 when frames of 1072 gates are thermally blinded by the 225μs long pulses with 3.5mW in-pulse power at detector 0, and 4mW in-pulse power at detector 1. While the system was blind, the cold plate temperature reading was −49.5 °C, and the TEC was running well below its maximum capacity at ITEC = 2.006A. Therefore it seems that even though this system does not check the cold plate temperature after the initial check, further checks of the cold plate temperature would probably not reveal that the detectors are in fact blind.

 figure: Fig. 7

Fig. 7 Thermal blinding of frames. The oscillograms show electrical and optical signals when frames of 1072 gates in detector 1 are thermally blinded by a 225μs blinding pulse, with 3.5mW pulse power at detector 0, and 4mW pulse power at detector 1. The blinding pulse causes a detection event outside the frame, where the system probably does not register clicks (If the click is registered, it could easily be avoided by increasing the power of the blinding pulse gradually, such that the comparator input AC-coupling keeps the voltage below the comparator threshold).

Download Full Size | PDF

To verify that the detectors could be controlled, we checked the response to a 4ns long control pulse timed slightly after the gate of one of the first bits of the frame, and the last bit of the frame. The detection probability thresholds for the second [57] and the last bit are given in Tables 2 and 3. Figure 8 shows oscillograms from detector 1 when it is blinded and controlled in the second bit of the frame.

 figure: Fig. 8

Fig. 8 Detector control during thermal blinding of frames. The oscillograms show electrical and optical signals when frames of 1072 gates in detector 1 are thermally blinded by a 225μs blinding pulse, with 3.5mW pulse power at detector 0, and 4mW pulse power at detector 1, and the detector is controlled by a 4ns long control pulse timed slightly after the second gate in the frame. In the upper and lower left sets of oscillograms, the 580μW control pulse never causes any click. In the lower right set, the control pulse is applied after the same gate in the frame, but now its increased 747μW peak power always causes a click.

Download Full Size | PDF

Tables Icon

Table 2. Control pulse peak power at 0 % and 100 % click probability thresholds for the second bit in the frame, when the frame is thermally blinded

Tables Icon

Table 3. Control pulse peak power at 0 % and 100 % click probability thresholds for the last bit in the frame, when the frame is thermally blinded

The click probability thresholds in Tables 2 and 3 each satisfy Eq. (1) individually. However, P0%,0 in the last bit of the frame is less than 1/2 of P100%,1 in the second bit of the frame. This means that the control pulse power would have to be decreased throughout the frame. Since the second and the last bit of the frame can be controlled, it is plausible that the eavesdropping method described in Section 2 could be applied to any bit of the frame.

What is remarkable about this blinding method is that due to the low thermal conductivity between the APD chip and the cold plate, as well as the thermal inertia of the nearby parts, the cold plate thermistor reports a value very close to the normal value. Therefore monitoring the cold plate temperature would not suffice to prevent thermal blinding.

In fact the system needs not to be operating in frames for such blinding to take place: Eve may heat the detectors accepting a 50% QBER for some sessions, eavesdropping on the next sessions.

4.3. Sinkhole blinding

It is natural to ask whether the framed blinding technique can be applied at the single gate level, i.e. what happens if bright illumination is applied between adjacent gates? It turns out that this also leads to blinding, but not primarily due to thermal effects. Since the comparator input is AC-coupled (see Fig. 2), the signal at the input of the comparator has the same area over and under 0V level when averaged over time much longer than R4·C1 = 165ns. Thus by sending long bright pulses between the gates and no illumination near the gate, it is possible to superimpose a negative-voltage pulse at the comparator input at the gate time. We call this negative pulse a sinkhole. An avalanche that occurs within it can have a normal amplitude yet remain below the comparator threshold level.

Using a 140ns long pulse beginning about 25ns after the gate, detector 0 becomes completely blind when Plaser > 205 μW, and detector 1 becomes blind when Plaser > 400 μW. To keep both detectors blind, Plaser = 500 μW is used subsequently. When a large pulse is applied between the gates, the detector will always experience a dark count in the gate due to trapped carriers. Figure 9 shows detector 1 blinded by a 140ns long, 500μW bright pulse, starting about 25ns after the gate.

 figure: Fig. 9

Fig. 9 Sinkhole blinding. The oscillograms show electrical and optical signals when detector 1 is blinded by a 500μW, 140ns long laser pulse in between the gates. The avalanche amplitude is about 130mV and would cause a click if it were not sitting in the negative-voltage pulse. It seems that the reduction in avalanche amplitude (compare to Fig. 3) is caused by heating of the APD, which effectively rises the breakdown voltage.

Download Full Size | PDF

Initially when the blinding pulses are turned on, there is a transient with about 20–100 clicks, which would be easily detectable in post-processing. Note again that the blinding only needs to be turned on once, and that the blinding can be turned on before the raw key exchange to avoid the clicks being registered.

Detector control is obtained by a 3.2ns long laser pulse timed shortly after the gate. The click probability thresholds found are listed in Table 4. Figure 10 shows oscillograms from detector 1 when it is blind and controlled. Once again, the thresholds in Table 4 satisfy Eq. (1), and thus the eavesdropping method described in Section 2 should be possible when the detectors are sinkhole blinded.

 figure: Fig. 10

Fig. 10 Detector control during sinkhole blinding. The oscillograms show electrical and optical signals when detector 1 is blinded with a 500μW, 140ns long laser pulse in between the gates, and controlled with a 3.2ns long laser pulse timed shortly after the gate. To the left, the 773μW control pulse never causes any click. To the right, the 908μW control pulse always causes a click.

Download Full Size | PDF

Tables Icon

Table 4. Control pulse peak power at 0 % and 100 % click probability thresholds, during sinkhole blinding

5. Discussion and countermeasures

First of all, the numerous detectors proved blindable and controllable [2729, 31, 54], and the large number of independent blinding methods available show that avoiding this loophole is non-trivial. Further the results presented in this paper clearly show that removing the impedance of the bias voltage supply is far from being a sufficient countermeasure for this detector design. Yuan et al. proposed to lower the comparator threshold, but as seen from the oscillograms in Fig. 9 sinkhole blinding can produce a very low amplitude on the comparator input by choosing an appropriate duty cycle of the blinding illumination. Therefore, lowering the comparator threshold also seems to be an insufficient countermeasure.

At this point it is not clear to us how to design hack-proof detectors. As we pointed out previously, the most obvious countermeasure is to monitor the optical power at Bob’s entrance with an additional detector. However as we also pointed out it is not obvious that this actually closes the loophole; the click threshold close to the gate may be very low, allowing for practically non-detectable control pulses [29]. Thus it is not clear how to set the threshold value for the entrance monitor; in any case the threshold should be derived from and incorporated into a security proof. It would also be crucial that this monitoring detector is not blindable, while being extremely sensitive. Until a detection scheme with a monitoring detector is proven secure, we believe that it cannot be considered as a sufficient countermeasure.

For the passively quenched scheme it has been proposed previously to monitor APD parameters such as APD bias voltage, current and temperature [27]. However, the results in Section 4.2 show that normal APD parameters do not necessarily guarantee single photon sensitivity: for thermal blinding of frames all the APD parameters report normal values during the frames while the detectors are in fact blind.

It is worth emphasizing that the loophole opens when Eve drives the detectors into an abnormal operating regime, namely the linear mode. However, there are also quantum detectors which are actually designed to operate in linear mode. For example, homodyne detectors used in continuous-variable QKD [58, 59] are probably not susceptible to the described attack.

6. Conclusion

The detectors in the Clavis2 QKD system have proved to be blindable by a variety of methods, even with a low-impedance bias voltage supply. Further, the detectors can always be controlled in the blind state. This allows eavesdropping on the QKD system, using the method described in Section 2. Since Eve may use an exact copy of Bob’s system, no parameters currently available to Bob reveal Eve’s presence. In practice, this should allow for perfect eavesdropping where Eve has an exact copy of Bob’s raw key, and thus can extract the full secret key. The eavesdropping strategy described in Section 2 has been implemented and used to capture 100% of the raw key in a 290m experimental entanglement-based QKD system [31]. We see no practical difficulties implementing the same eavesdropper for this commercial QKD system, using off-the-shelf components. Actually we have proposed a plug-and-play eavesdropper scheme [29] for easy deployment.

Many detectors have already been proved blindable and controllable by Eve [2729], and the large variety of blinding methods available for the system tested could probably be used on other detector designs as well. While it is relatively easy to design a countermeasure that prevents blinding attacks with the specific parameters chosen in the present work, it is unclear to us how to build generic secure detectors.

This work further emphasizes the importance of thoroughly investigating the non-idealities of each component in a QKD system, as well as battle-testing the system as a whole. This has been a necessary step for any security technology, and will surely be a crucial step for QKD as well. QKD cannot be cracked nor broken, since the principles have been proven secure once and for all. Now the challenge is to make a truly secure implementation of QKD where the components behave within the assumptions of the security proofs.

ID Quantique has been notified about the loophole prior to this publication, and has implemented countermeasures.

A. Measurement setup

Figure 11 shows the measurement setup used for this experiment. The trigger signal is tapped directly from the PECL gate signal (before DD1 in Fig. 2).

 figure: Fig. 11

Fig. 11 The setup used in the experiment. Both detectors were illuminated simultaneously by inserting a 50/50 fibre-optic coupler (not shown in the diagram) before the APDs.

Download Full Size | PDF

When pump current is used to control the power of the laser, the pulse width will vary slightly with the peak power. In our experiment, the observed change in pulse width is less than 10 % after doubling the laser power. Also, the comparator threshold does not seem to be significantly dependent on the pulse width, thus we consider our results valid despite this small change in the laser pulse width.

B. Direct measurement of quantum efficiency

When CW illumination is applied to the APD, the applied electrical gate “propagates” to the comparator input. This might be caused by a change in linear multiplication coefficient caused by the electrical gate. This allowed us to measure the quantum efficiency mapped inside the “propagated” gate with about 200ps precision.

The single photon sensitivity was measured using a id300 short-pulsed laser attenuated to a mean photon number of 1 per pulse. The quantum efficiency η was derived from the data assuming that the detector is linear (i.e. that an n-photon state is detected with probability 1 −(1 − η)n). The timing of the photon arrival at the APD relative to the applied gate was aligned by observing a response to unattenuated laser pulse on top of the 2.1mW CW illumination. Figure 12 shows the result of the measurement on detector 1.

 figure: Fig. 12

Fig. 12 Quantum efficiency measured directly within the electrical gate for detector 1. The photon sensitivity drops about 1ns before the falling edge of the gate, because avalanches that start late do not have time to develop a large enough current to cross the comparator threshold.

Download Full Size | PDF

Acknowledgments

We acknowledge discussions with Sergio Cova. This work was supported by the Research Council of Norway (grant no. 180439/V30) and DAADppp mobility program financed by NFR (project no. 199854) and DAAD (project no. 50727598).

References and links

1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in “Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing,” (IEEE Press, New York, Bangalore, India, 1984), pp. 175–179.

2. A. K. Ekert, “Quantum cryptography based on bell theorem,” Phys. Rev. Lett. 67, 661–663 (1991). [CrossRef]   [PubMed]  

3. H.-K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283, 2050–2056 (1999). [CrossRef]   [PubMed]  

4. P. W. Shor and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett. 85, 441–444 (2000). [CrossRef]   [PubMed]  

5. D. Stucki, N. Walenta, F. Vannel, R. T. Thew, N. Gisin, H. Zbinden, S. Gray, C. R. Towery, and S. Ten, “High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres,” N. J. Phys. 11, 075003 (2009). [CrossRef]  

6. Commercial QKD systems are available from at least two companies: ID Quantique (Switzerland), http://www.idquantique.com; MagiQ Technologies (USA), http://www.magiqtech.com.

7. D. Mayers, “Advances in cryptology,” in “Proceedings of Crypto’96,”, vol. 1109, N. Koblitz, ed. (Springer, New York, 1996), vol. 1109, pp. 343–357.

8. D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,” Quantum Inf. Comput. 4, 325–360 (2004).

9. H. Inamori, N. Lütkenhaus, and D. Mayers, “Unconditional security of practical quantum key distribution,” Eur. Phys. J. D 41, 599–627 (2007). [CrossRef]  

10. C.-H. F. Fung, K. Tamaki, B. Qi, H.-K. Lo, and X. Ma, “Security proof of quantum key distribution with detection efficiency mismatch,” Quantum Inf. Comput. 9, 131–165 (2009).

11. L. Lydersen and J. Skaar, “Security of quantum key distribution with bit and basis dependent detector flaws,” Quantum Inf. Comput. 10, 0060 (2010).

12. Ø. Marøy, L. Lydersen, and J. Skaar, “Security of quantum key distribution with arbitrary individual imperfections,” Phys. Rev. A 82, 032337 (2010). [CrossRef]  

13. A. Vakhitov, V. Makarov, and D. R. Hjelme, “Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography,” J. Mod. Opt. 48, 2023–2038 (2001).

14. N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, “Trojan-horse attacks on quantum-key-distribution systems,” Phys. Rev. A 73, 022320 (2006). [CrossRef]  

15. V. Makarov, A. Anisimov, and J. Skaar, “Effects of detector efficiency mismatch on security of quantum cryptosystems,” Phys. Rev. A 74, 022313 (2006). [CrossRef]  

16. V. Makarov, A. Anisimov, and J. Skaar, “Effects of detector efficiency mismatch on security of quantum cryptosystems: erratum,” 78, 019905 (2008).

17. V. Makarov and J. Skaar, “Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols,” Quantum Inf. Comput. 8, 0622 (2008).

18. B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, “Time-shift attack in practical quantum cryptosystems,” Quantum Inf. Comput. 7, 73–82 (2007).

19. Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, “Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems,” Phys. Rev. A 78, 042333 (2008). [CrossRef]  

20. A. Lamas-Linares and C. Kurtsiefer, “Breaking a quantum key distribution system through a timing side channel,” Opt. Express 15, 9388–9393 (2007). [CrossRef]   [PubMed]  

21. S. Nauerth, M. Fürst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, “Information leakage via side channels in freespace BB84 quantum cryptography,” N. J. Phys. 11, 065001 (2009). [CrossRef]  

22. C.-H. F. Fung, B. Qi, K. Tamaki, and H.-K. Lo, “Phase-remapping attack in practical quantum-key-distribution systems,” Phys. Rev. A 75, 032314 (2007). [CrossRef]  

23. F. Xu, B. Qi, and H.-K. Lo, “Experimental demonstration of phase-remapping attack in a practical quantum key distribution system,” N. J. Phys. 12, 113026 (2010). [CrossRef]  

24. Precisely, the quantum bit error rate (QBER) is the fraction given by the number of bits which differ in Alice’s and Bob’s raw key, divided by the length of the raw key.

25. H. F. Chau, “Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate,” Phys. Rev. A 66, 060302 (2002). [CrossRef]  

26. D. Gottesman and H.-K. Lo, “Proof of security of quantum key distribution with two-way classical communications,” IEEE Trans. Inf. Theory 49, 457–475 (2003). [CrossRef]  

27. V. Makarov, “Controlling passively quenched single photon detectors by bright light,” N. J. Phys. 11, 065003 (2009). [CrossRef]  

28. V. Makarov, A. Anisimov, and S. Sauge, “Quantum hacking: adding a commercial actively-quenched module to the list of single-photon detectors controllable by Eve,” e-print arXiv:0809.3408v2 [quant-ph].

29. L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, “Hacking commercial quantum cryptography systems by tailored bright illumination,” Nat. Photonics 4, 686–689 (2010). [CrossRef]  

30. C. Wiechers, L. Lydersen, C. Wittmann, D. Elser, J. Skaar, C. Marquardt, V. Makarov, and G. Leuchs, “After-gate attack on a quantum cryptosystem,” e-print arXiv:1009.2683 [quant-ph] .

31. I. Gerhardt, Q. Liu, J. Skaar, A. Lamas-Linares, C. Kurtsiefer, and V. Makarov, “Perfect eavesdropping on a quantum cryptography system,” e-print arXiv:1011.0105 [quant-ph].

32. I. Marcikic, A. Lamas-Linares, and C. Kurtsiefer, “Free-space quantum key distribution with entangled photons,” Appl. Phys. Lett. 89, 101122 (2006). [CrossRef]  

33. M. P. Peloso, I. Gerhardt, C. Ho, A. Lamas-Linares, and C. Kurtsiefer, “Daylight operation of a free space, entanglement-based quantum key distribution system,” N. J. Phys. 11, 045007 (2009). [CrossRef]  

34. Z. L. Yuan, J. F. Dynes, and A. J. Shields, “Avoiding the detector blinding attack on quantum cryptography,” Nat. Photonics 4, 800–801 (2010). [CrossRef]  

35. S. Cova, M. Ghioni, A. Lotito, I. Rech, and F. Zappa, “Evolution and prospects for single-photon avalanche diodes and quenching circuits,” J. Mod. Opt. 51, 1267–1288 (2004).

36. All references to the APD bias voltage are absolute valued, thus an APD biased “above” the breakdown voltage is in the Geiger mode. In practice the APDs are always reverse-biased.

37. V. Makarov and D. R. Hjelme, “Faked states attack on quantum cryptosystems,” J. Mod. Opt. 52, 691–705 (2005). [CrossRef]  

38. V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett. 92, 057901 (2004). [CrossRef]   [PubMed]  

39. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett. 91, 057901 (2003). [CrossRef]   [PubMed]  

40. X.-B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. Lett. 94, 230503 (2005). [CrossRef]   [PubMed]  

41. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94, 230504 (2005). [CrossRef]   [PubMed]  

42. S. Cova, A. Longoni, and A. Andreoni, “Towards picosecond resolution with single-photon avalanche diodes,” Rev. Sci. Instrum. 52, 408–412 (1981). [CrossRef]  

43. D. S. Bethune and W. P. Risk, “An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light,” IEEE J. Quantum Electron. 36, 340–347 (2000). [CrossRef]  

44. A. Tomita and K. Nakamura, “Balanced, gated-mode photon detector for quantum-bit discrimination at 1550 nm,” Opt. Lett. 27, 1827–1829 (2002). [CrossRef]  

45. Z. L. Yuan, B. E. Kardynal, A. W. Sharpe, and A. J. Shields, “High speed single photon detection in the near infrared,” Appl. Phys. Lett. 91, 041114 (2007). [CrossRef]  

46. Osterm, PE4-115-14–15, http://osterm.ru/PAGE/MULTISTAGE.HTM, visited 3. August 2010.

47. When the temperature increases, the lattice vibrations in the APD increase. This increases the probability that the electron collides with the lattice, and therefore reduces the probability that the electron gains enough energy to trigger ionization of a new electron-hole pair. Therefore, to ensure that the electron gains ionization energy, the electric field must be larger, and thus the breakdown voltage is increased.

48. S. M. Sze and K. K. Ng, Physics of semiconductor devices (Wiley-Interscience, 2007).

49. Marlow, NL4012, http://www.marlow.com/media/marlow/product/downloads/nl4012t/NL4012.pdf, visited 3. August 2010.

50. The detectors do not have any dark counts and are assumed blind at a temperature of about −40°C at the cold plate, or when the bias voltage is decreased by 0.97V. If one assumes that the APD temperature is equal to the cold plate temperature, this means that heating the detectors by 10K is equivalent to decreasing the bias voltage by about 1V.

51. G. Ribordy, J.-D. Gautier, N. Gisin, O. Guinnard, and H. Zbinden, “Automated ‘plug & play’ quantum key distribution,” Electron. Lett. 34, 2116–2117 (1998). [CrossRef]  

52. D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, “Quantum key distribution over 67 km with a plug&play system,” N. J. Phys. 4, 41 (2002). [CrossRef]  

53. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74, 145–195 (2002). [CrossRef]  

54. S. Sauge, L. Lydersen, A. Anisimov, J. Skaar, and V. Makarov. in preparation.

55. G. Ribordy, J.-D. Gautier, N. Gisin, O. Guinnard, and H. Zbinden, “Fast and user-friendly quantum key distribution,” J. Mod. Opt. 47, 517–531 (2000).

56. The system actually sends the qubits in frames of 1075 qubits each. We initially made a mistake when counting them and used 1072 qubits, which is very close and does not affect the results.

57. We picked the second bit to simplify synchronization in our measurement setup. The results for the first bit should be very similar to the results for the second bit.

58. S. L. Braunstein and P. van Loock, “Quantum information with continuous variables,” Rev. Mod. Phys. 77, 513–577 (2005). [CrossRef]  

59. U. L. Andersen, G. Leuchs, and C. Silberhorn, “Continuous-variable quantum information processing,” Laser Photon. Rev. 4, 337 (2010), ArXiv:1008.3468v1 [quant-ph]. [CrossRef]  

Cited By

Optica participates in Crossref's Cited-By Linking service. Citing articles from Optica Publishing Group journals and other participating publishers are listed here.

Alert me when this article is cited.


Figures (12)

Fig. 1
Fig. 1 The last beam splitter (BS) as well as the detectors in a phase-encoded QKD system. I0 and I1 is the current running through APD 0/1, and Ith is the comparator threshold current above which the detector registers a click. Here we assume that the APDs are in the linear mode, and that Eve sends a bright pulse slightly above the optical power thresholds. a) Eve and Bob have selected matching bases. Therefore the full intensity in the pulse from Eve hits detector 0. The current caused by Eve’s pulse crosses the threshold current and causes a click. b) Eve and Bob have selected opposite bases. Therefore half the intensity of Eve’s pulse hits each detector (corresponding to 50% detection probability in either detector for single photons). This causes no click as the current is below the threshold for each detector.
Fig. 2
Fig. 2 Equivalent detector bias and comparator circuit. Taps T1-T3 are analog taps of the APD gates (Vgate,0/1), the APD bias (Vbias,0/1) and the comparator input (Vcomp,0/1). The digital tap T4 of the detector output (Vclick,0/1) has been converted to logic levels in all oscillograms. For the experiments presented in section 4, the resistor R3 has been shorted.
Fig. 3
Fig. 3 An example of electrical signals during two gates in detector 1 without any illumination. In the first gate thermal fluctuations or trapped carriers have caused an avalanche, and a click at the comparator output (dark count). A typical amplitude of the avalanche peak is 200mV for detector 0 and 300mV for detector 1. Normally the system removes 50 gates after a detection event, but for this oscillogram this feature has been disabled. In the second gate there is no detection event. When no current runs through the APD, it is equivalent to a capacitor, and thus approximately the derivative of the gate pulse shape propagates to the comparator input, with peak positive amplitude ≈ 35mV.
Fig. 4
Fig. 4 Calculated heat dissipation (based on measured APD current and voltage) versus the optical illumination for each of the two detectors.
Fig. 5
Fig. 5 The temperature of the cold plate and TEC current reported by the software, versus the total amount of heat dissipated in the APDs. It takes several minutes for the cold plate temperature to stabilize at a new value (hotter than −50°C) after the power dissipation in the APDs is changed.
Fig. 6
Fig. 6 Click probability versus power of CW illumination applied to both detectors simultaneously.
Fig. 7
Fig. 7 Thermal blinding of frames. The oscillograms show electrical and optical signals when frames of 1072 gates in detector 1 are thermally blinded by a 225μs blinding pulse, with 3.5mW pulse power at detector 0, and 4mW pulse power at detector 1. The blinding pulse causes a detection event outside the frame, where the system probably does not register clicks (If the click is registered, it could easily be avoided by increasing the power of the blinding pulse gradually, such that the comparator input AC-coupling keeps the voltage below the comparator threshold).
Fig. 8
Fig. 8 Detector control during thermal blinding of frames. The oscillograms show electrical and optical signals when frames of 1072 gates in detector 1 are thermally blinded by a 225μs blinding pulse, with 3.5mW pulse power at detector 0, and 4mW pulse power at detector 1, and the detector is controlled by a 4ns long control pulse timed slightly after the second gate in the frame. In the upper and lower left sets of oscillograms, the 580μW control pulse never causes any click. In the lower right set, the control pulse is applied after the same gate in the frame, but now its increased 747μW peak power always causes a click.
Fig. 9
Fig. 9 Sinkhole blinding. The oscillograms show electrical and optical signals when detector 1 is blinded by a 500μW, 140ns long laser pulse in between the gates. The avalanche amplitude is about 130mV and would cause a click if it were not sitting in the negative-voltage pulse. It seems that the reduction in avalanche amplitude (compare to Fig. 3) is caused by heating of the APD, which effectively rises the breakdown voltage.
Fig. 10
Fig. 10 Detector control during sinkhole blinding. The oscillograms show electrical and optical signals when detector 1 is blinded with a 500μW, 140ns long laser pulse in between the gates, and controlled with a 3.2ns long laser pulse timed shortly after the gate. To the left, the 773μW control pulse never causes any click. To the right, the 908μW control pulse always causes a click.
Fig. 11
Fig. 11 The setup used in the experiment. Both detectors were illuminated simultaneously by inserting a 50/50 fibre-optic coupler (not shown in the diagram) before the APDs.
Fig. 12
Fig. 12 Quantum efficiency measured directly within the electrical gate for detector 1. The photon sensitivity drops about 1ns before the falling edge of the gate, because avalanches that start late do not have time to develop a large enough current to cross the comparator threshold.

Tables (4)

Tables Icon

Table 1 Control pulse peak power at 0 % and 100 % click probability thresholds, in CW thermal blinding mode

Tables Icon

Table 2 Control pulse peak power at 0 % and 100 % click probability thresholds for the second bit in the frame, when the frame is thermally blinded

Tables Icon

Table 3 Control pulse peak power at 0 % and 100 % click probability thresholds for the last bit in the frame, when the frame is thermally blinded

Tables Icon

Table 4 Control pulse peak power at 0 % and 100 % click probability thresholds, during sinkhole blinding

Equations (1)

Equations on this page are rendered with MathJax. Learn more.

max i { P 100 % , i } < 2 ( min i { P 0 % , i } ) .
Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.