OSA's Digital Library

Optics Express

Optics Express

  • Editor: C. Martijn de Sterke
  • Vol. 15, Iss. 15 — Jul. 23, 2007
  • pp: 9388–9393

Breaking a quantum key distribution system through a timing side channel

Antía Lamas-Linares and Christian Kurtsiefer  »View Author Affiliations

Optics Express, Vol. 15, Issue 15, pp. 9388-9393 (2007)

View Full Text Article

Enhanced HTML    Acrobat PDF (135 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



The security of quantum key distribution relies on the validity of quantum mechanics as a description of nature and on the non-existence of leaky degrees of freedom in the practical implementations. We experimentally demonstrate how, in some implementations, timing information revealed during public discussion between the communicating parties can be used by an eavesdropper to undetectably access a significant portion of the “secret” key.

© 2007 Optical Society of America

OCIS Codes
(030.5260) Coherence and statistical optics : Photon counting
(270.5290) Quantum optics : Photon statistics

ToC Category:
Quantum Optics

Original Manuscript: May 10, 2007
Revised Manuscript: July 10, 2007
Manuscript Accepted: July 11, 2007
Published: July 16, 2007

Antía Lamas-Linares and Christian Kurtsiefer, "Breaking a quantum key distribution system through a timing side channel," Opt. Express 15, 9388-9393 (2007)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. M. Dûsek, N. Lütkenhaus, and M. Hendrych, "Quantum Cryptography," Prog. in Opt. 49, 381-454 (2006).
  2. C. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of the IEEE Int. Conf. On Computer Systems and Signal Processing (ICCSSP), p. 175 (Bangalore, India, 1984).
  3. A. Ekert, "Quantum cryptography based on Bell’s Theorem," Phys. Rev. Lett. 67, 661-663 (1991). [CrossRef] [PubMed]
  4. N. Gisin and R. Thew, "Quantum Communication," Nature Photonics 1, 165-171 (2007). [CrossRef]
  5. C. Kurtsiefer, P. Zarda, M. Halder, H. Weinfurter, P. M. Gorman, P. R. Tapster, and J. G. Rarity, "A step towards global key distribution," Nature 419, 450 (2002). [CrossRef] [PubMed]
  6. C. Kurtsiefer, P. Zarda, S. Mayer, and H. Weinfurter, "The breakdown flash of Silicon Avalanche Photodiodes backdoor for eavesdropper attacks?" J. Mod. Opt. 48, 2039-2047 (2001). [CrossRef]
  7. V. Makarov and D. R. Hjelme, "Faked states attack on quantum cryptosystems," J. Mod. Opt. 52, 691-705 (2005). [CrossRef]
  8. V. Makarov, A. Anisimov, and J. Skaar, "Effects of detector efficiency mismatch on security of quantum cryptosystems," Phys. Rev. A 74, 022313 (2006). [CrossRef]
  9. N. Gisin, S. Fasel, B. Krauss, H. Zbinden, and G. Ribordy, "Trojan horse attack on quantum key distribution systems," Phys. Rev. A 73, 022320 (2006). [CrossRef]
  10. Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, H.-K. Lo, "Experimental demonstration of time-shift attack against practical quantum key distribution systems," arXiv:0704.3253v1 [quant-ph].
  11. R. Ursin, F. Tiefenbacher, T. Schmitt-Manderbach, H. Weier, T. Scheidl, M. Lindenthal, B. Blauensteiner, T. Jennewein, J. Perdigues, P. Trojek, B. Ömer, M. Fürst, M. Meyenburg, J. Rarity, Z. Sodnik, C. Barbieri, H. Weinfurter, and A. Zeilinger, "Free-space distribution of entanglement and single photons over 144 km," quantph/0607182.
  12. A. Poppe, A. Fedrizzi, T. Lorünser, O. Maurhardt, R. Ursin, H. R. Böhm, M. Peev, M. Suda, C. Kurtsiefer, H. Weinfurter, T. Jennewein, and A. Zeilinger, "Practical quantum key distribution with polarization entangled photons," Opt. Express 12, 3865-3871 (2004). [CrossRef] [PubMed]
  13. K. J. Resch, M. Lindenthal, B. Blauensteiner, H. R. Böhm, A. Fedrizzi, C. Kurtsiefer, A. Poppe, T. Schmitt-Manderbach, M. Taraba, R. Ursin, P. Walther, H. Weier, H. Weinfurter, and A. Zeilinger, "Distributing entanglement and single photons through an intra-city, free-space quantum channel," Opt. Express 13, 202-209 (2005). [CrossRef] [PubMed]
  14. I. Marcikic, A. Lamas-Linares, and C. Kurtsiefer, "Free-space quantum key distribution with entangled photons," Appl. Phys. Lett. 89, 101122 (2006). [CrossRef]
  15. C.-Z. Peng, T. Yang, X.-H. Bao, Jun-Zhang, X.-M. Jin, F.-Y. Feng, B. Yang, J. Ying, Q. Zhang, N. Li, B.-L. Tian, and J.-W. Pan, "Experimental free-space distribution of entangled photon pairs over a noisy ground atmosphere of 13km," Phys. Rev. Lett. 95, 030502 (2005).
  16. C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput. 17, 210 (1988). [CrossRef]
  17. MagiQ  Technologies (http://www.magiqtech.com) and idQuantique (http://www.idquantique.com) offer two of the first commercially available QKD systems.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1. Fig. 2. Fig. 3.
Fig. 4.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited