Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

Journal Article · · Physical Review. A
 [1]; ;  [2]
  1. Section de Physique, Ecole Polytechinque Federale de Lausanne, CH-1015 Ecublens (Switzerland)
  2. Group of Applied Physics, University of Geneva, 20, rue de l'Ecole-de-Medecine, CH-1211 Geneva 4 (Switzerland)
In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Luetkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2{yields}3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2{yields}3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2{yields}3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.
OSTI ID:
20653273
Journal Information:
Physical Review. A, Journal Name: Physical Review. A Journal Issue: 4 Vol. 71; ISSN 1050-2947; ISSN PLRAAN
Country of Publication:
United States
Language:
English

Similar Records

Security of two quantum cryptography protocols using the same four qubit states
Journal Article · Thu Sep 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718487

Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks
Journal Article · Wed Dec 31 23:00:00 EST 2003 · Physical Review. A · OSTI ID:20640589

Effects of detector efficiency mismatch on security of quantum cryptosystems
Journal Article · Tue Aug 15 00:00:00 EDT 2006 · Physical Review. A · OSTI ID:20853030