Americas

  • United States

Asia

Oceania

by John E Dunn

Quantum key blinding hack ‘deeply flawed’

News
Dec 02, 20103 mins
Data and Information SecuritySecurityToshiba

The ‘blinding’ hack of quantum key distribution (QKD) systems publicised by Norwegian researchers earlier this year was based on a seriously flawed setup of the equipment being eavesdropped upon, scientists at Toshiba’s Cambridge Research Lab have said.

The ‘blinding’ hack of quantum key distribution (QKD) systems publicised by Norwegian researchers earlier this year was based on a seriously flawed setup of the equipment being eavesdropped upon, scientists at Toshiba’s Cambridge Research Labs have said.

In a paper published in Nature Photonics, the Toshiba team, led by prominent quantum cryptography physicist Dr Andrew Shields, demolish the basis of an attack that caused awkward headlines for a technology designed to secure military and government communications backed with the absolute certainty of quantum physics.

According to the paper, the QKD test system used by the Norwegian University of Science and Technology to demonstrate the avalanche photo diode (APD) ‘blinding’ attack scenario turns out to have included an unnecessary biasing resistor that would not normally be used.

Without this component, the attack fails. Although the test QKD system was a commercial system, in the view of Shields’ team, the majority of commercial QKD systems using ‘gated Geiger mode’ APD designs would not include this element.

The team further notes that the ‘discrimination levels’ – the sensitivity of the APD to the photons being sent to it – was set to an unusually high level of sensitivity which runs counter to a standard setup.

Even if either or both of these elements were accepted, the attack could anyway be detected by simply monitoring the photocurrent levels emerging from the SPD.

“We found the detector blinding attack to be completely ineffective,” said Shields, who oversaw lab testing of the Norwegian attack scenario. “QKD is secure but you have to operate the equipment in the right way.”

In his view, the Norwegian system was most likely a “toy” research setup that did not parallel how QKD technology would be used in real installations, describing it as a “soft target” that allowed for hacking by making engineering assumptions.

Shields agreed that attacks, however theoretical, were important for stress-testing the engineering assumptions that underlie QKD, but remained confident that current designs were up to the security uses to which they were being put.

Earlier in 2010, a separate QKD if hard-to-quantify hack was demonstrated by a team at the University of Toronto.

A more lateral challenge might in fact turn out to be the possibility of tampering with equipment rather than direct eavesdropping. This is the vulnerability of all systems that use highly secure transmission technology must face up to, namely the possibility that they might be misconfigured or interfered with by trusted staff.

As this week’s Wikileaks cable leak shows, the ‘hacker within’ remains an issue that no organisation can easily dismiss as fanciful.

A separate challenge for QKD remains that of bitrates and distance, which remains in the region of 1Mbit/s at best over fibre distances of 50km. The Toshiba Cambridge Research Labs has previously set world records in this type of QKD advance.