Vulnerabilities / Threats
9/7/2010
10:00 PM
50%
50%

Quantum Cryptography Breached With Lasers

Using lasers to blind quantum cryptography photon detectors, Norwegian computer scientists were able to obtain a copy of a secure key without leaving any trace of their presence.




Strategic Security Survey: Global Threat, Local Pain
(click for larger image and for full photo gallery)

Norwegian computer scientists have perfected a laser-based attack against quantum cryptography systems that allows them to eavesdrop on communications without revealing their presence.

One of the biggest commercial uses for quantum cryptography to date has been to securely exchange keys. Unlike traditional key distribution techniques, using quantum mechanics offers a seemingly foolproof upside: any attempt by an attacker to measure quantum data disturbs it -- per the Heisenberg uncertainty principle -- which a quantum cryptography system can detect, thus ensuring that communications remain secure.

Enter the laser. The team of researchers from the Norwegian University of Science and Technology (NTNU), the University of Erlangen-Nürnberg and the Max Planck Institute for the Science of Light in Erlangen developed a quantum eavesdropping technique that remotely controls the photon detector, which is a key component in most quantum cryptography systems.

According to Gerd Leuchs, who's part of the research team, "the security of quantum cryptography relies on quantum physics but … it must also be properly implemented." In other words, any system may have implementation loopholes. The attack works by blinding the photon detector with a bright light -- the laser. Over its continuous wave of light, the researchers then added even stronger laser pulses to transmit data, but in a way that the quantum cryptography security system can't detect, because it doesn't involve quantum mechanics.

The researchers reported their findings in an advance online version of Nature Photonics, released last week. "Based on these experimental results," they write, someone "can attack the systems with off-the-shelf components, obtaining a perfect copy of the raw key without leaving any trace of her presence." With the key in hand, communications between the two key sharers could then be intercepted and decrypted, again without either party knowing.

One of the authors of the study, Vadim Makarov, who's a researcher in the quantum hacking group at NTNU, said that "unlike previously published attempts, this attack is implementable with current, off-the-shelf components."

The researchers demonstrated the technique against two products -- MagiQ Technology's QPN 5505 and ID Quantique Clavis2 systems -- but the vulnerability potentially applies to any such product. "The security loophole we have exposed is intrinsic to a whole class of single-photon detectors, regardless of their manufacturer and model," said Makarov.

Before publishing their research, the team disclosed the vulnerabilities to both of the manufacturers, and also worked with ID Quantique to create a countermeasure. While that countermeasure hasn't been detailed, in their published article, the researchers suggest adding an optical power meter to quantum key-sharing systems, to watch for laser-wielding attackers.

MagiQ, meanwhile, has discontinued selling the affected product but not made any of its newer models available to the researchers for testing.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7441
Published: 2015-05-29
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

CVE-2014-9727
Published: 2015-05-29
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.

CVE-2015-0200
Published: 2015-05-29
IBM WebSphere Commerce 6.x through 6.0.0.11 and 7.x before 7.0.0.8 IF2 allows local users to obtain sensitive database information via unspecified vectors.

CVE-2015-0751
Published: 2015-05-29
Cisco IP Phone 7861, when firmware from Cisco Unified Communications Manager 10.3(1) is used, allows remote attackers to cause a denial of service via crafted packets, aka Bug ID CSCus81800.

CVE-2015-0752
Published: 2015-05-29
Cross-site scripting (XSS) vulnerability in Cisco TelePresence Video Communication Server (VCS) X8.5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCut27635.

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?