0:00:10hello i would like to talk about a later publication
0:00:14on hacking a quantum crypto system using the to get attacked
0:00:19we find attacking particularly interesting because one improve the systems problem is a new level
0:00:25of security in communication
0:00:28the data to party elephant ball once you communicate then in contrast to classical cryptography
0:00:33one cryptography of as in the method
0:00:36with unconditional security in principle
0:00:41anniversary you cannot eavesdrop on the communication of elephant ball because you will introduce errors
0:00:47and therefore
0:00:48detected
0:00:50as secure to prove for such a scenario requires that model assumptions what the device
0:00:54of elephant ball
0:00:57this works fine in theory but
0:01:00what about in practice
0:01:01in the next meaning will ask the question can real alice and bob communicate securely
0:01:06and we'll show you that real device properties should be taken into account in that
0:01:11it should prove otherwise we consider the problems
0:01:17these are the physical clip the devices that upright and bother for task one packers
0:01:21but obviously not possible to be shown in the publications
0:01:25the group the system we hacked is called clarice two main console by the acoustic
0:01:30on the left side you see the other's module on the right side you see
0:01:33the bob model in their exchanging secret keys
0:01:36this is how the l s module looks from the inside the bit sequence and
0:01:40you could you need to be random so here you see to quantum random number
0:01:44generator modules that perform this task
0:01:46next to various optical the tectonic components you see the phase modulator that encodes the
0:01:52bit information on optical signals
0:01:54these optical signals are sent by alice
0:01:58the optical fibre act as a transmission channel
0:02:01in a practical application this is of course much longer and can be on the
0:02:05order of fifty kilometres
0:02:08here the optical fibre enters ball
0:02:12well also has a face modulator to perform the basis choice
0:02:17the two detectors in ball avalanche prototype working in gated mode
0:02:22here we see also some additions made by us
0:02:24so as to get some information about various electronic signals in the module
0:02:29in the real attack the inverse three of course cannot access such information however it
0:02:35enables us to verify that our tech really works
0:02:40the outputs from the use electronic task and now the on the oscilloscope
0:02:46what you see are the gate pulses applied to the two detectors
0:02:50this tells us when detectors involve all active
0:02:53what we also see is that alice and bob communicating frames of about thousand pulses
0:03:00we now zoom into a single frame and see individual case
0:03:04the system normally expect the quantum signals to arrive within these detection gates
0:03:10our tech which is an intercept in wrist and kind of an attack times the
0:03:15pulses however to the right after the game
0:03:17we have checked various time delays and the intensity of the pulses to optimize the
0:03:22attack
0:03:23explain the principle of the attack we need some theory
0:03:27here you can see an ivy diagram of the a p d you which we
0:03:31can explain the guy commode of an a p d based single photon detector
0:03:35for the gate you see that there is a bias voltage applied to the a
0:03:39p d
0:03:40see the look point
0:03:41during the gate the voltage is increased about the so-called breakdown voltage see the green
0:03:46point
0:03:47if you foreign
0:03:48impinge as on the a p d then an avalanche affect generates a large current
0:03:53this generates the detection event
0:03:56but what happens
0:03:57if we illuminating it after the gate
0:04:00with the bias voltage below the breakdown voltage
0:04:02the a p d is in a linear mode
0:04:05this means that current really a p d is proportional to the optical power
0:04:10p d merely registers whenever the powers relatively strong
0:04:14the detector therefore has properties
0:04:16which are very much unlike the ones
0:04:18during the gate
0:04:19and also unlike the ones assumed in the security proof
0:04:22you know application
0:04:24we show how to exploit this deviation
0:04:26we simulate an attack of you in which she measures all ones signal
0:04:30and we stands bright pulses time off the box gates
0:04:34we found that the attack when to stick one clip the system insecure for large
0:04:38parameter range
0:04:40so we're in contact with the manufacturer in accounting and believe that all work is
0:04:45vital for the practical security of q k d our team currently works on the
0:04:51other attack on that obvious to device
0:04:53so we'll be back