• Journal of Semiconductors
  • Vol. 45, Issue 4, 042702 (2024)
Lianjun Jiang1, Dongdong Li1、2、3、*, Yuqiang Fang1, Meisheng Zhao1、2、3, Ming Liu1, Zhilin Xie1、4, Yukang Zhao1, Yanlin Tang1, Wei Jiang1, Houlin Fang1, Rui Ma1, Lei Cheng1, Weifeng Yang1, Songtao Han5, and Shibiao Tang1、2、3、6、**
Author Affiliations
  • 1QuantumCTek Co., Ltd., Hefei 230088, China
  • 2Shandong Institute of Quantum Science and Technology Co., Ltd., Jinan 250101, China
  • 3QuantumCTek (Beijing) Co., Ltd., Beijing 100193, China
  • 4School of Cyber Science and Technology, University of Science and Technology of China, Hefei 230027, China
  • 5Anhui Armed Police Force, Hefei 230026, China
  • 6School of Electrical Engineering and Automation, Anhui University, Hefei 230601, China
  • show less
    DOI: 10.1088/1674-4926/45/4/042702 Cite this Article
    Lianjun Jiang, Dongdong Li, Yuqiang Fang, Meisheng Zhao, Ming Liu, Zhilin Xie, Yukang Zhao, Yanlin Tang, Wei Jiang, Houlin Fang, Rui Ma, Lei Cheng, Weifeng Yang, Songtao Han, Shibiao Tang. Countermeasure against blinding attack for single-photon detectors in quantum key distribution[J]. Journal of Semiconductors, 2024, 45(4): 042702 Copy Citation Text show less

    Abstract

    Quantum key distribution (QKD), rooted in quantum mechanics, offers information-theoretic security. However, practical systems open security threats due to imperfections, notably bright-light blinding attacks targeting single-photon detectors. Here, we propose a concise, robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks. Our strategy uses a dual approach: detecting the bias current of the avalanche photodiode (APD) to defend against continuous-wave blinding attacks, and monitoring the avalanche amplitude to protect against pulsed blinding attacks. By integrating these two branches, the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts, significantly enhancing the resilience of QKD systems against various bright-light blinding attacks. This method fortifies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security.

    Introduction

    In the context of today's rapid digital advancement, the proliferation and expansion of networks undeniably underscore the significance of communication security. Quantum key distribution (QKD), rooted in the fundamental principles of quantum mechanics, possesses the unique capability to generate theoretically secure symmetric keys between distant parties[1, 2], thereby offering a highly secure communication for the impending quantum computing era[3, 4]. After decades of sustained research and development, QKD technology has achieved remarkable progress[510], with notable enhancements in key performance metrics such as secure key rate and transmission distance[1113], and continuous expansion in application scenarios[1418]. Various backbone and metropolitan networks have commenced the practical application of networked solutions[1921]. Free-space QKD has also realized secure satellite-to-ground communications[22, 23], and the integrated space-to-ground quantum secure communication network has been experimentally demonstrated[24, 25].

    Although the information-theoretic security of QKD has been rigorously proven[2], this cannot ensure the security of the practical devices employed[26]. The physical properties of the components in actual devices might deviate from the models in theoretical proofs, leaving room for quantum hacking exploits[2730]. Specifically, single-photon detectors at the receiving end are vulnerable to several potential attacks, including the blinding attack[3133], the after-gate attack[34], the dead-time attack[35], the time-shift attack[36], the superlinear attack[37], the device calibration attack[38], the double-click attack[39], and the backflash attack[40], among others. Blinding attacks, in particular, involve bombarding the avalanche photodiode (APD) with bright illumination, causing it to regress from Geiger mode to linear mode, thereby manipulating the single-photon detector's response. Given the relative ease of executing blinding attacks and their potential to compromise the entire key information upon successful execution, they warrant serious attention in QKD systems. Existing protective strategies primarily involve monitoring the bias current of APDs[4143], triggering an attack warning when the current escalates. However, this method suffers from low detection bandwidth and fails to detect blinding attacks using pulsed light[44, 45].

    In this paper, we present a countermeasure designed to fortify quantum key distribution systems against blinding attacks. Our approach centers around a schematic configuration that incorporates bias current detection and avalanche amplitude monitoring, tailored specifically for sinusoidally gated single-photon detectors[46, 47]. It effectively alerts to a wide range of bright light blinding attacks executed with continuous or pulsed light. Such a capability is instrumental in bolstering the security framework of practical QKD systems, effectively shielding them from a spectrum of blinding attacks. Moreover, the practicality and effectiveness of this strategy have been experimentally validated.

    Method

    QKD systems typically use gate-triggered Geiger-mode APDs as detectors. An APD operates in linear mode when the applied reverse bias voltage is below its breakdown voltage. Conversely, it enters Geiger mode when the reverse bias exceeds the breakdown voltage. During operation, these detectors are susceptible to a vulnerability called the blinding attack, where strong laser injections cause them to degrade from Geiger mode to linear mode. If blinded, detectors cannot response to single-photon signals. The attacker, named EVE, can exploit this vulnerability, forcing the detector into linear mode during a period called the blinding interval. While in this mode, EVE can trigger the detector with strong pulses. By adjusting the intensity correctly, she can hide her attacking activities. Considering APDs' operating principles and attack methods, we have developed a solution to protect high-speed, sinusoidally gated single-photon detectors in QKD systems from blinding attacks, as shown in Fig. 1.

    Schematic of the countermeasure against blinding attack for single-photon detectors.

    Figure 1.Schematic of the countermeasure against blinding attack for single-photon detectors.

    A field-programmable gate array (FPGA) drives a boost converter through a DAC to provide the reverse bias voltage to the APD. This voltage, slightly lower than the APD's avalanche breakdown voltage (approximately 65 V), is applied to the APD's cathode through a Rbias (1 kΩ), rendering the APD incapable of single-photon detection as it operates in linear mode. A 1.25 GHz gating signal (10 V), superimposed on the reverse bias voltage via AC coupling, is applied to the APD's cathode, pushing the APD's reverse voltage above its avalanche breakdown voltage and enabling single-photon detection in Geiger mode.

    If the attacker launches a continuous-wave (CW) blinding attack, a persistent photocurrent is generated inside the APD. Due to the voltage division effect of the series resistance Rbias at the APD's cathode, even when the gating signal arrives, the reverse voltage across the APD remains below the avalanche breakdown voltage, keeping the APD in linear mode and leading to the detector being blinded throughout. To counter such attacks, we monitor the APD bias current to defend against continuous-wave blinding attacks. Specifically, we use a boost converter with current detection capability (model: SGM41285A) that can not only generate APD bias voltages ranging from 10 to 70 V but also mirror the APD bias operating current at a 1∶1 ratio. This mirrored current, referred to as "bias current", is digitized after I−V conversion and sampled by an ADC (model SGM58031, with the resolution of 16 bit and the sampling rate of 960 Hz). The FPGA controller continuously reads the sampled voltage values, using the changes in this bias current to identify the intensity of injected light and determine the presence of continuous-wave strong light injection behavior.

    If the attacker employs a pulsed blinding attack, the APD generates pulsed photocurrents, pushing the APD into a linear mode of operation. However, the strong light pulses are transient, causing the detector to be blinded only intermittently. Consequently, methods that monitor APD bias current are less sensitive to pulsed light and struggle to promptly detect such attacks. To counter these types of attacks, we capitalize on the inherent avalanche multiplication property of APDs, where stronger light induces larger photocurrents. We have developed a method to identify instances of pulsed bright light injection by recognizing the amplitudes of the avalanche signals.

    The process begins with the avalanche signal from the APD's anode, which is first passed through a 50 Ω sampling resistor. It then undergoes initial filtering and amplification with a 25 dB gain via AC coupling. Subsequently, a 1∶1 power divider splits the signal into two separate paths. The first path is designated for single-photon detection. It extracts signals caused by single-photon avalanches, which have relatively low amplitudes. To ensure that these signals are discernible, they undergo further filtering and a second amplification stage (with a 20 dB gain) to elevate them to a few hundred millivolts. After reaching this level, a discriminator (model ADCMP572, with the bandwidth of 8 GHz) set at 50 mV for pulse recognition processes these signals. These regular detection events are then relayed to an FPGA for additional data processing. The second path is responsible for detecting bright pulsed light. The amplitude of these avalanches is much greater than that of single-photon avalanches and, are therefore detected after the first amplification stage. Additional amplification would risk saturating the amplifier's output, which would restrict the measurable range of light intensity. Thus, this channel bypasses further amplification and proceeds directly to amplitude discrimination. The discrimination threshold is adjustable, based on desired sensitivity levels. Once a signal exceeds this threshold, it is classified as an abnormal detection signal and fed into the FPGA. The FPGA then assesses whether the APD has been subjected to pulsed bright light injections. If it detects avalanche signals above the set threshold, an alarm is triggered to indicate a blinding attack.

    Monitoring the bias current enables the identification of continuous-wave bright light injection, while avalanche amplitude monitoring detects pulsed bright light injection. Integrating these two strategies allows for comprehensive identification of various types of bright light injection.

    Experimental test

    We have developed a high-speed sinusoidally gated single-photon detector building on the protective strategies previously outlined. This detector has been tested and verified through comprehensive bright light injection experiments. The primary technical specifications of this single-photon detector are as follows: gating frequency at 1.25 GHz, dead time of 100 ns, detection efficiency of 20%, dark count rate of 1 kcps, and an after-pulse probability of 2%. The test environment for the blinding attack is shown in Fig. 2.

    (Color online) Test environment for the countermeasure against blinding attack.

    Figure 2.(Color online) Test environment for the countermeasure against blinding attack.

    To verify the defense effectiveness against continuous-wave blinding attacks, our initial tests, conducted under CW attack conditions, determined the average optical power at which the detector becomes non-responsive. Appropriate bias current detection alarm thresholds were set. Fig. 3 displays the detector count and bias current detection responses across a range of injected optical power. The right vertical axis represents the bias current code, referring to the quantized code value of the bias current after it has been converted through the I−V process and subsequently captured by the ADC.

    (Color online) Test for continuous-wave bright light injection.

    Figure 3.(Color online) Test for continuous-wave bright light injection.

    As observed in Fig. 3, the detector count markedly increases at an injected light power of −95 dBm, reaches saturation at −65 dBm, and plummets to nearly zero at around 0 dBm, indicating that the detector is blinded at this point. To ensure security, the detector should trigger an alarm and initiate preventive actions before reaching this blinded state, thus highlighting the need for setting a maximum light power threshold for the alarm. From the perspective of detection sensitivity, enhancing the ability to detect lower intensity light injections is crucial. Considering that the bias current code is 8890 with no light present—reflecting the intrinsic electronic current bias, including the avalanche photodiode (APD) reverse operating current and the bias detection working current—we established the alarm threshold at a bias current code of 12933, corresponding to −50 dBm of bright light injection, as denoted by the red dashed line in Fig. 3. This setting allows for the detection of bright light injection activity 50 dB before the detector is at risk of being blinded.

    To assess the defense against pulsed blinding attacks, we conducted tests targeting pulsed light injections. Pulsed blinding attacks can vary in emission frequency, intensity, temporal width, and the timing of injection. We carried out tests using a range of typical values for validation. Due to the unique gate signal waveform of the sinusoidally gated detector, detection efficiency differs across various areas, leading to a range of bright light avalanche pulse intensities. Initially, we used narrow pulsed light with a frequency of 625 kHz and a full width at half maximum (FWHM) of 50 ps, injecting it over the full gating period range of 800 ps. This tested the amplitude values of bright light avalanche pulses at different time, helping to establish the alarm threshold for bright light amplitude detection. We then applied attack light at the same frequency (625 kHz) with FWHMs of 50 ps, 1 ns, and 10 ns to span out-of-gate, in-gate, and the entire gate period regions. This comparison between bias current detection and avalanche amplitude detection informed our defense strategy against pulsed light attacks.

    Fig. 4 displays the avalanche amplitudes under varying optical power—ranging from 100 to 105 photons/pulse. Across all gating areas, the avalanche amplitude rises with increased injected light power. Additionally, the amplitude of the bright light avalanche is much greater than that from single-photon avalanches, which reaches a maximum of 60 mV as shown in Fig. 4. When light intensity hits 103 photons/pulse, the bright light avalanche amplitude reaches maximum value due to the saturation of the first-stage amplifier. Setting a lower detection threshold for bright light avalanche amplitude will lead to earlier detection of pulsed light injections. However, if the threshold is set too low, noise could cause false alarms. According to the results shown in Fig. 4, we have set the alarm generation threshold at 200 mV, which correlates to tens of photons/pulse and is substantially above the single-photon avalanche pulse's maximum amplitude. The occurrence of even a single signal exceeding this threshold would indicate a pulsed blinding attack event.

    (Color online) Detector response to pulsed blinding attack at different time of the gate. Each curve corresponds to a specific optical pulse intensity ranging from 100 to 105 (in the unit of photons/pulse).

    Figure 4.(Color online) Detector response to pulsed blinding attack at different time of the gate. Each curve corresponds to a specific optical pulse intensity ranging from 100 to 105 (in the unit of photons/pulse).

    Fig. 5 shows the response of bright light avalanche detection counts and bias current codes to injected optical power, evaluating their efficacy in preventing pulsed light attacks. The horizontal red dashed line indicates the bias current detection alarm threshold, and a vertical black dashed line denotes the injected optical power at which all attack pulses are detectable. When subject to 50-ps narrow pulsed blinding attacks, both in-gate and out-of-gate, the bias current code increases slightly (from approximately 8850 to 8950) with higher injected light power, yet remain well below the alarm threshold of 12933. Consequently, bias current detection does not trigger an alarm and fails to detect pulsed light injection. In contrast, avalanche amplitude monitoring successfully identifies all attack pulses and events. For attacks using 1-ns and 10-ns pulsed light that span the entire gating period, the bias current rises more noticeably with increased injected light power (from about 8850 to 10500), but are still significantly lower than the alarm threshold. Therefore, bias current detection is unable to initiate an alarm and cannot discern pulsed light injection, while avalanche amplitude monitoring continues to effectively detect all attack pulses and events.

    (Color online) Detector response to different pulse width of blinding attack. (a) Attack using pulse of 1-ns-width. (b) Attack using pulse of 10-ns-width. (c) In-gate attack using pulse of 50-ps-width. (d) Out-of-gate attack using pulse of 50-ps-width.

    Figure 5.(Color online) Detector response to different pulse width of blinding attack. (a) Attack using pulse of 1-ns-width. (b) Attack using pulse of 10-ns-width. (c) In-gate attack using pulse of 50-ps-width. (d) Out-of-gate attack using pulse of 50-ps-width.

    It is worth noting that lowering the threshold for bias current detection may marginally improve the sensitivity to detecting continuous-wave and pulsed light injections. Nevertheless, this method is vulnerable as attackers can simply decrease their attack frequency, leading to negligible changes in the average light power and thus, neutralizing the effectiveness of bright light attack detection that relies on APD bias current. On the other hand, the defense strategy that employs avalanche amplitude monitoring retains its efficacy against such low-frequency attacks.

    Conclusion and outlook

    In summary, we have proposed and demonstrated a countermeasure against blinding attack of the single-photon detectors in quantum key distribution. Our solution employs a dual-faceted approach combining bias current detection and avalanche amplitude monitoring, optimized for sinusoidally gated single-photon detectors. It is also adaptable for pulsed gated single-photon detectors, requiring adjustments in the signal extraction processing. This strategy has shown to be effective, offering preemptive alerts to a variety of bright light blinding assaults, utilizing both continuous-wave and pulsed light sources. Its implementation enhances the security infrastructure of QKD systems, providing robust protection against a wide range of blinding tactics. The feasibility and effectiveness of our approach is further affirmed by comprehensive experimental validation, contributing a significant enhancement to the domain of quantum cryptography security.

    References

    [1] N Gisin, G Ribordy, W Tittel et al. Quantum cryptography. Rev Mod Phys, 74, 145(2002).

    [2] V Scarani, H Bechmann-Pasquinucci, N J Cerf et al. The security of practical quantum key distribution. Rev Mod Phys, 81, 1301(2009).

    [3] Y L Wu, W S Bao, S R Cao et al. Strong quantum computational advantage using a superconducting quantum processor. Phys Rev Lett, 127, 180501(2021).

    [4] H S Zhong, H Wang, Y H Deng et al. Quantum computational advantage using photons. Science, 370, 1460(2020).

    [5] Q Zhang, F H Xu, Y A Chen et al. Large scale quantum key distribution: Challenges and solutions. Opt Express, 26, 24260(2018).

    [6] S Pirandola, U L Andersen, L Banchi et al. Advances in quantum cryptography. Adv Opt Photonics, 12, 1012(2020).

    [7] Q Liu, Y M Huang, Y Q Du et al. Advances in chip-based quantum key distribution. Entropy, 24, 1334(2022).

    [8] C Z Peng, J Zhang, D Yang et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys Rev Lett, 98, 010505(2007).

    [9] D D Li, M S Zhao, Z Li et al. High dimensional quantum key distribution with temporal and polarization hybrid encoding. Opt Fiber Technol, 68, 102828(2022).

    [10] Y L Tang, C Zhou, D D Li et al. Time-Bin phase-encoding quantum key distribution using Sagnac-based optics and compatible electronics. Opt Express, 31, 26335(2023).

    [11] A Boaron, G Boso, D Rusca et al. Secure quantum key distribution over 421 km of optical fiber. Phys Rev Lett, 121, 190502(2018).

    [12] Y Liu, W J Zhang, C Jiang et al. Experimental twin-field quantum key distribution over 1000 km fiber distance. Phys Rev Lett, 130, 210801(2023).

    [13] W Li, L K Zhang, H Tan et al. High-rate quantum key distribution exceeding 110 Mb s–1. Nat Photonics, 17, 416(2023).

    [14] T Y Chen, J Wang, H Liang et al. Metropolitan all-pass and inter-city quantum communication network. Opt Express, 18, 27217(2010).

    [15] D D Li, S Gao, G C Li et al. Field implementation of long-distance quantum key distribution over aerial fiber with fast polarization feedback. Opt Express, 26, 22793(2018).

    [16] Y L Tang, Z L Xie, C Zhou et al. Field test of quantum key distribution over aerial fiber based on simple and stable modulation. Opt Express, 31, 26301(2023).

    [17] F Zhou, H L Yong, D D Li et al. Study on quantum key distribution between different media. Acta Phys Sin, 63, 140303(2014).

    [18] D D Li, Q Shen, W Chen et al. Proof-of-principle demonstration of quantum key distribution with seawater channel: Towards space-to-underwater quantum communication. Opt Commun, 452, 220(2019).

    [19] T Y Chen, X Jiang, S B Tang et al. Implementation of a 46-node quantum metropolitan area network. NPJ Quantum Inf, 7, 134(2021).

    [20] J F Dynes, A Wonfor, W W S Tam et al. Cambridge quantum network. NPJ Quantum Inf, 5, 101(2019).

    [21] D Ribezzo, M Zahidy, I Vagniluca et al. Deploying an inter-european quantum network. Adv Quantum Technol, 6, 2200061(2023).

    [22] S K Liao, H L Yong, C Liu et al. Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat Photonics, 11, 509(2017).

    [23] S K Liao, W Q Cai, W Y Liu et al. Satellite-to-ground quantum key distribution. Nature, 549, 43(2017).

    [24] Y A Chen, Q Zhang, T Y Chen et al. An integrated space-to-ground quantum communication network over 4, 600 kilometres. Nature, 589, 214(2021).

    [25] C Y Lu, Y Cao, C Z Peng et al. Micius quantum experiments in space. Rev Mod Phys, 94, 035001(2022).

    [26] D Gottesman, H K Lo, N Lütkenhaus et al. Security of quantum key distribution with imperfect devices. Quantum Inf Comput, 4, 325(2004).

    [27] F H Xu, X F Ma, Q Zhang et al. Secure quantum key distribution with realistic devices. Rev Mod Phys, 92, 025002(2020).

    [28] D D Li, Y L Tang, Y K Zhao et al. Security of optical beam splitter in quantum key distribution. Photonics, 9, 527(2022).

    [29] Y Wang, G H Du, Y B Xu et al. Practical security of high-dimensional quantum key distribution with intensity modulator extinction. Entropy, 24, 460(2022).

    [30] S H Sun, A Q Huang. A review of security evaluation of practical quantum key distribution system. Entropy, 24, 260(2022).

    [31] V Makarov. Controlling passively quenched single photon detectors by bright light. New J Phys, 11, 065003(2009).

    [32] L Lydersen, C Wiechers, C Wittmann et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat Photonics, 4, 686(2010).

    [33] I Gerhardt, Q Liu, A Lamas-Linares et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat Commun, 2, 349(2011).

    [34] C Wiechers, L Lydersen, C Wittmann et al. After-gate attack on a quantum cryptosystem. New J Phys, 13, 013043(2011).

    [35] H Weier, H Krauss, M Rau et al. Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors. New J Phys, 13, 073024(2011).

    [36] Y Zhao, C H F Fung, B Qi et al. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys Rev A, 78, 042333(2008).

    [37] Y J Qian, D Y He, S Wang et al. Hacking the quantum key distribution system by exploiting the avalanche-transition region of single-photon detectors. Phys Rev Appl, 10, 064062(2018).

    [38] N Jain, C Wittmann, L Lydersen et al. Device calibration impacts security of quantum key distribution. Phys Rev Lett, 107, 110501(2011).

    [39] N J Beaudry, T Moroder, N Lütkenhaus. Squashing models for optical measurements in quantum communication. Phys Rev Lett, 101, 093601(2008).

    [40] P V P Pinheiro, P Chaiwongkhot, S Sajeed et al. Eavesdropping and countermeasures for backflash side channel in quantum cryptography. Opt Express, 26, 21020(2018).

    [41] Z L Yuan, J F Dynes, A J Shields. Avoiding the blinding attack in QKD. Nat Photonics, 4, 800(2010).

    [42] Z L Yuan, J F Dynes, A J Shields. Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography. Appl Phys Lett, 98, 231104(2011).

    [43] G Gras, N Sultana, A Huang et al. Optical control of single-photon negative feedback avalanche diode detector. J Appl Phys, 127, 094502(2020).

    [44] Z H Wu, A Q Huang, H Chen et al. Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination. Opt Express, 28, 25574(2020).

    [45] B W Gao, Z H Wu, W X Shi et al. Ability of strong-pulse illumination to hack self-differencing avalanche photodiode detectors in a high-speed quantum-key-distribution system. Phys Rev A, 106, 033713(2022).

    [46] J Zhang, P Eraerds, N Walenta et al. 2.23 GHz gating InGaAs/InP single-photon avalanche diode for quantum key distribution, 7681, 239(2010).

    [47] Y Q Fang, W Chen, T H Ao et al. InGaAs/InP single-photon detectors with 60% detection efficiency at 1550 nm. Rev Sci Instrum, 91, 083102(2020).

    Lianjun Jiang, Dongdong Li, Yuqiang Fang, Meisheng Zhao, Ming Liu, Zhilin Xie, Yukang Zhao, Yanlin Tang, Wei Jiang, Houlin Fang, Rui Ma, Lei Cheng, Weifeng Yang, Songtao Han, Shibiao Tang. Countermeasure against blinding attack for single-photon detectors in quantum key distribution[J]. Journal of Semiconductors, 2024, 45(4): 042702
    Download Citation