TY - JOUR
T1 - Quantum vulnerability trends and potential implementation risks
AU - Brazaola-Vicario, Aitor
AU - Ruiz, Alejandra
AU - Lage, Oscar
AU - Jacob, Eduardo
AU - Astorga, Jasone
N1 - Publisher Copyright:
© 2024 Optica Publishing Group.
PY - 2024/8/15
Y1 - 2024/8/15
N2 - Quantum key distribution (QKD) is a cryptographic technique that enables secure private key exchange between geographically distant parties over an insecure channel, protecting confidentiality against potential eavesdroppers. QKD has evolved significantly since its inception with the BB84 protocol proposed by Bennett and Brassard in 1984. Its theoretical foundation relies on quantum physics, particularly the uncertainty principle, the no-cloning theorem, and particle entanglement, which ensures its information-theoretic security when combined with the one-time-pad cryptographic algorithm. However, certain security loopholes persist in terms of practical implementation in commercial devices. Some vulnerabilities are associated with side-channel vectors linked to commonly used optical subcomponents, while others are more related to how existing protocols handle encoding and communication pipelines. In this work, we aim to comprehensively study the current state of security loopholes affecting QKD technology in commercial devices. We also provide a concise overview of the existing types of QKD implementations. Additionally, we offer insights into current trends and vulnerability countermeasures, paving the way for future research and novel mechanisms to enhance the implementation security of commercial QKD devices.
AB - Quantum key distribution (QKD) is a cryptographic technique that enables secure private key exchange between geographically distant parties over an insecure channel, protecting confidentiality against potential eavesdroppers. QKD has evolved significantly since its inception with the BB84 protocol proposed by Bennett and Brassard in 1984. Its theoretical foundation relies on quantum physics, particularly the uncertainty principle, the no-cloning theorem, and particle entanglement, which ensures its information-theoretic security when combined with the one-time-pad cryptographic algorithm. However, certain security loopholes persist in terms of practical implementation in commercial devices. Some vulnerabilities are associated with side-channel vectors linked to commonly used optical subcomponents, while others are more related to how existing protocols handle encoding and communication pipelines. In this work, we aim to comprehensively study the current state of security loopholes affecting QKD technology in commercial devices. We also provide a concise overview of the existing types of QKD implementations. Additionally, we offer insights into current trends and vulnerability countermeasures, paving the way for future research and novel mechanisms to enhance the implementation security of commercial QKD devices.
UR - http://www.scopus.com/inward/record.url?scp=85202429437&partnerID=8YFLogxK
U2 - 10.1364/OPTCON.530352
DO - 10.1364/OPTCON.530352
M3 - Article
AN - SCOPUS:85202429437
SN - 2770-0208
VL - 3
SP - 1438
EP - 1460
JO - Optics Continuum
JF - Optics Continuum
IS - 8
M1 - 530352
ER -