Vulnerabilities / Threats
9/7/2010
10:00 PM
50%
50%

Quantum Cryptography Breached With Lasers

Using lasers to blind quantum cryptography photon detectors, Norwegian computer scientists were able to obtain a copy of a secure key without leaving any trace of their presence.




Strategic Security Survey: Global Threat, Local Pain
(click for larger image and for full photo gallery)

Norwegian computer scientists have perfected a laser-based attack against quantum cryptography systems that allows them to eavesdrop on communications without revealing their presence.

One of the biggest commercial uses for quantum cryptography to date has been to securely exchange keys. Unlike traditional key distribution techniques, using quantum mechanics offers a seemingly foolproof upside: any attempt by an attacker to measure quantum data disturbs it -- per the Heisenberg uncertainty principle -- which a quantum cryptography system can detect, thus ensuring that communications remain secure.

Enter the laser. The team of researchers from the Norwegian University of Science and Technology (NTNU), the University of Erlangen-Nürnberg and the Max Planck Institute for the Science of Light in Erlangen developed a quantum eavesdropping technique that remotely controls the photon detector, which is a key component in most quantum cryptography systems.

According to Gerd Leuchs, who's part of the research team, "the security of quantum cryptography relies on quantum physics but … it must also be properly implemented." In other words, any system may have implementation loopholes. The attack works by blinding the photon detector with a bright light -- the laser. Over its continuous wave of light, the researchers then added even stronger laser pulses to transmit data, but in a way that the quantum cryptography security system can't detect, because it doesn't involve quantum mechanics.

The researchers reported their findings in an advance online version of Nature Photonics, released last week. "Based on these experimental results," they write, someone "can attack the systems with off-the-shelf components, obtaining a perfect copy of the raw key without leaving any trace of her presence." With the key in hand, communications between the two key sharers could then be intercepted and decrypted, again without either party knowing.

One of the authors of the study, Vadim Makarov, who's a researcher in the quantum hacking group at NTNU, said that "unlike previously published attempts, this attack is implementable with current, off-the-shelf components."

The researchers demonstrated the technique against two products -- MagiQ Technology's QPN 5505 and ID Quantique Clavis2 systems -- but the vulnerability potentially applies to any such product. "The security loophole we have exposed is intrinsic to a whole class of single-photon detectors, regardless of their manufacturer and model," said Makarov.

Before publishing their research, the team disclosed the vulnerabilities to both of the manufacturers, and also worked with ID Quantique to create a countermeasure. While that countermeasure hasn't been detailed, in their published article, the researchers suggest adding an optical power meter to quantum key-sharing systems, to watch for laser-wielding attackers.

MagiQ, meanwhile, has discontinued selling the affected product but not made any of its newer models available to the researchers for testing.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1774
Published: 2015-04-28
The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.

CVE-2015-1863
Published: 2015-04-28
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.

CVE-2015-3340
Published: 2015-04-28
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.

CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.