Vulnerabilities / Threats
9/7/2010
10:00 PM
50%
50%

Quantum Cryptography Breached With Lasers

Using lasers to blind quantum cryptography photon detectors, Norwegian computer scientists were able to obtain a copy of a secure key without leaving any trace of their presence.




Strategic Security Survey: Global Threat, Local Pain
(click for larger image and for full photo gallery)

Norwegian computer scientists have perfected a laser-based attack against quantum cryptography systems that allows them to eavesdrop on communications without revealing their presence.

One of the biggest commercial uses for quantum cryptography to date has been to securely exchange keys. Unlike traditional key distribution techniques, using quantum mechanics offers a seemingly foolproof upside: any attempt by an attacker to measure quantum data disturbs it -- per the Heisenberg uncertainty principle -- which a quantum cryptography system can detect, thus ensuring that communications remain secure.

Enter the laser. The team of researchers from the Norwegian University of Science and Technology (NTNU), the University of Erlangen-Nürnberg and the Max Planck Institute for the Science of Light in Erlangen developed a quantum eavesdropping technique that remotely controls the photon detector, which is a key component in most quantum cryptography systems.

According to Gerd Leuchs, who's part of the research team, "the security of quantum cryptography relies on quantum physics but … it must also be properly implemented." In other words, any system may have implementation loopholes. The attack works by blinding the photon detector with a bright light -- the laser. Over its continuous wave of light, the researchers then added even stronger laser pulses to transmit data, but in a way that the quantum cryptography security system can't detect, because it doesn't involve quantum mechanics.

The researchers reported their findings in an advance online version of Nature Photonics, released last week. "Based on these experimental results," they write, someone "can attack the systems with off-the-shelf components, obtaining a perfect copy of the raw key without leaving any trace of her presence." With the key in hand, communications between the two key sharers could then be intercepted and decrypted, again without either party knowing.

One of the authors of the study, Vadim Makarov, who's a researcher in the quantum hacking group at NTNU, said that "unlike previously published attempts, this attack is implementable with current, off-the-shelf components."

The researchers demonstrated the technique against two products -- MagiQ Technology's QPN 5505 and ID Quantique Clavis2 systems -- but the vulnerability potentially applies to any such product. "The security loophole we have exposed is intrinsic to a whole class of single-photon detectors, regardless of their manufacturer and model," said Makarov.

Before publishing their research, the team disclosed the vulnerabilities to both of the manufacturers, and also worked with ID Quantique to create a countermeasure. While that countermeasure hasn't been detailed, in their published article, the researchers suggest adding an optical power meter to quantum key-sharing systems, to watch for laser-wielding attackers.

MagiQ, meanwhile, has discontinued selling the affected product but not made any of its newer models available to the researchers for testing.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5027
Published: 2014-12-26
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2062. Reason: This candidate is a reservation duplicate of CVE-2010-2062. Notes: All CVE users should reference CVE-2010-2062 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2010-1441
Published: 2014-12-26
Multiple heap-based buffer overflows in VideoLAN VLC media player before 1.0.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder.

CVE-2010-1442
Published: 2014-12-26
VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer.

CVE-2010-1443
Published: 2014-12-26
The parse_track_node function in modules/demux/playlist/xspf.c in the XSPF playlist parser in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty location element in an XML Shareable Playlist Format...

CVE-2010-1444
Published: 2014-12-26
The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.