Method of defending equipment calibration attacks in quantum key distribution system
A quantum key distribution and equipment technology, applied in key distribution, can solve problems such as adverse attack effects, inability to intuitively monitor equipment calibration attacks, demonstrations, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] 1) First complete the construction of the parameter calibration system, such as Figure 4 shown.
[0076] The components of the parameter calibration system include: a standard light source in the sender, a quantum channel and a detection system to be calibrated at the receiver. There is also a built-in calibration light source in the receiving side, which is connected to the detection system of the receiving side to be calibrated through the coupling of optical switches or BS and other coupling elements.
[0077] Parameter calibration needs to be done in a safe area. There are two specific situations and methods for selecting a safe area.
[0078] ① One is that the sender, receiver and the quantum channel between them are all placed in a safe area that cannot be touched by the attacker Eve. Then the process of parameter calibration of the detection system in this area is safe. This safe area can be guaranteed during factory calibration, because it has not been depl...
example 1
[0172] Such as Figure 5 As shown, for example, for a certain QKD device, the delay scanning results before leaving the factory, the HVPN delay positions are 100ps, 200ps, 300ps, and 400ps respectively, and the delay difference between HVPNs is:
[0173] V-H=100ps, P-H=200ps, N-H=300ps;
[0174] H-V=-100ps, P-V=100ps, N-V=200ps;
[0175] H-P=-200ps, V-P=-100ps, N-P=100ps;
[0176] H-N=-300ps, V-N=-200ps, P-N=-100ps;
[0177] Adding the commonly used floating value ±20ps obtained from data statistics, the credible range of the delay difference is:
[0178] V-H=[80ps, 120ps], P-H=[180ps, 220ps], N-H=[280ps, 320ps];
[0179] H-V=[-120ps,-80ps], P-V=[80ps, 120ps], N-V=[180ps, 220ps];
[0180] H-P=[-220ps,-180ps], V-P=[-120ps,-80ps], N-P=[80ps, 120ps];
[0181] H-N=[-320ps,-280ps], V-N=[-220ps,-180ps], P-N=[-120ps,-80ps];
[0182] Store the range in this QKD device.
[0183] After the device is deployed at the factory and goes online, start it up and run it, and perform a d...
example 2
[0190] The same factory equipment parameters as Example 1, if a delayed scan result is as follows Figure 7 As shown, then:
[0191] V-H=120ps, P-H=230ps, N-H=330ps;
[0192] H-V=-120ps, P-V=110ps, N-V=210ps;
[0193] H-P=-230ps, V-P=-110ps, N-P=100ps;
[0194] H-N=-330ps, V-N=-210ps, P-N=-100ps;
[0195] Compare the delay difference result with the trusted delay difference range set by the factory above, and find that "P-H", "N-H", "H-P" and "H-N" exceed the credible range, and the device calibration process of the delay scan is abnormal , it is determined that there is a device calibration attack and an alarm is issued, and the delay scanning process is restarted until the delay difference of each HVPN channel returns to the credible range, and the device is determined to return to the normal working state, and the device calibration attack stops.
[0196] The present invention is applicable to all QKD systems, and is suitable for active (such as phase modulator) or pass...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


