×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

SIGN IN YOUR ACCOUNT TO HAVE ACCESS TO DIFFERENT FEATURES

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR DETAILS?

AAH, WAIT, I REMEMBER NOW!

CREATE ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • SUPPORT

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

What is the Photon Number Splitting (PNS) attack, and how does it constrain the communication distance in quantum cryptography?

by EITCA Academy / Saturday, 15 June 2024 / Published in Cybersecurity, EITC/IS/QCF Quantum Cryptography Fundamentals, Practical Quantum Key Distribution, Quantum hacking - part 2, Examination review

The Photon Number Splitting (PNS) attack is a sophisticated eavesdropping technique used against quantum key distribution (QKD) systems. This attack exploits the multi-photon pulses that occur in certain QKD protocols, particularly those that use weak coherent pulses (WCP) instead of single-photon sources. Understanding the PNS attack requires a thorough grasp of the principles of quantum cryptography, the nature of quantum states used in QKD, and the vulnerabilities inherent in practical implementations.

Quantum Key Distribution and Weak Coherent Pulses

Quantum key distribution is a method that allows two parties, commonly referred to as Alice (the sender) and Bob (the receiver), to generate a shared, secret key, which can be used for secure communication. One of the most widely known QKD protocols is BB84, proposed by Charles Bennett and Gilles Brassard in 1984. In an ideal scenario, QKD protocols utilize single photons to encode information. However, generating true single-photon sources is technologically challenging and expensive.

As a practical alternative, many QKD systems use weak coherent pulses, which are attenuated laser pulses that contain an average of less than one photon per pulse. These pulses follow a Poisson distribution, meaning that while most pulses contain zero or one photon, there is a non-zero probability that some pulses will contain two or more photons.

The Mechanism of Photon Number Splitting Attacks

The PNS attack leverages the presence of these multi-photon pulses. An eavesdropper, commonly referred to as Eve, can perform a PNS attack by intercepting the quantum channel between Alice and Bob. When Eve detects a multi-photon pulse, she can split off one photon and allow the rest to continue to Bob. This process is known as "photon splitting."

Eve can store the split photon in a quantum memory and wait until the basis reconciliation step of the QKD protocol to measure it. During basis reconciliation, Alice and Bob publicly share the bases they used for each photon, allowing Eve to measure her stored photon in the correct basis without introducing any detectable errors. This enables Eve to gain information about the key without being detected by Alice and Bob.

Impact on Communication Distance

The effectiveness of a PNS attack is highly dependent on the distance between Alice and Bob. As the communication distance increases, the probability of photon loss in the quantum channel also increases. To compensate for this loss, Alice might increase the intensity of the weak coherent pulses, inadvertently increasing the probability of multi-photon pulses. This, in turn, makes the QKD system more susceptible to PNS attacks.

The maximum secure communication distance in a QKD system is constrained by the balance between the attenuation of the quantum channel and the vulnerability to PNS attacks. If the distance is too long, the attenuation will be high, leading Alice to increase the pulse intensity, thereby increasing the likelihood of multi-photon pulses and making the system more vulnerable to PNS attacks.

Countermeasures and Practical Considerations

To mitigate the risk of PNS attacks, several countermeasures can be employed:

1. Decoy States: One effective countermeasure is the use of decoy states, proposed by Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen. In this approach, Alice randomly varies the intensity of the pulses, creating decoy states with different mean photon numbers. By analyzing the detection statistics of these decoy states, Alice and Bob can detect the presence of an eavesdropper performing a PNS attack. Decoy state QKD has been shown to significantly enhance the security and extend the communication distance of QKD systems.

2. True Single-Photon Sources: Another approach is to use true single-photon sources, which eliminate the possibility of multi-photon pulses. Advances in single-photon technology, such as quantum dots and heralded photon sources, are promising, although they are not yet widely implemented in practical QKD systems due to technological and cost constraints.

3. Improved Error Correction and Privacy Amplification: Enhancing the error correction and privacy amplification processes can also help mitigate the impact of PNS attacks. By improving the efficiency of these processes, Alice and Bob can extract a secure key even in the presence of higher error rates introduced by an eavesdropper.

Example Scenario

Consider a QKD system using the BB84 protocol with weak coherent pulses. Alice sends pulses with a mean photon number (μ) of 0.1. At a short distance, the probability of multi-photon pulses is low, and the system is relatively secure against PNS attacks. However, as the distance increases to 100 km, the attenuation of the quantum channel increases, leading Alice to increase μ to 0.2 to ensure sufficient detection rates at Bob's end.

With the increased μ, the probability of multi-photon pulses also increases, making the system more susceptible to PNS attacks. Eve can exploit this by intercepting the channel, splitting off photons from multi-photon pulses, and storing them in a quantum memory. By the time Alice and Bob perform basis reconciliation, Eve can measure her stored photons in the correct basis, gaining information about the key without being detected.

To counter this, Alice and Bob could implement decoy states. Alice sends pulses with varying mean photon numbers, such as 0.1, 0.05, and 0.01. By analyzing the detection statistics of these decoy states, Alice and Bob can detect discrepancies that indicate the presence of an eavesdropper. This allows them to take appropriate measures to ensure the security of the key.The Photon Number Splitting attack poses a significant threat to QKD systems that use weak coherent pulses. By exploiting multi-photon pulses, an eavesdropper can gain information about the key without being detected. The communication distance in QKD systems is constrained by the balance between channel attenuation and vulnerability to PNS attacks. Implementing countermeasures such as decoy states, true single-photon sources, and improved error correction and privacy amplification processes can enhance the security and extend the communication distance of QKD systems.

Other recent questions and answers regarding EITC/IS/QCF Quantum Cryptography Fundamentals:

  • How does the detector control attack exploit single-photon detectors, and what are the implications for the security of Quantum Key Distribution (QKD) systems?
  • What are some of the countermeasures developed to combat the PNS attack, and how do they enhance the security of Quantum Key Distribution (QKD) protocols?
  • How do single photon detectors operate in the context of the Canadian Quantum Satellite, and what challenges do they face in space?
  • What are the key components of the Canadian Quantum Satellite project, and why is the telescope a critical element for effective quantum communication?
  • What measures can be taken to protect against the bright-light Trojan-horse attack in QKD systems?
  • How do practical implementations of QKD systems differ from their theoretical models, and what are the implications of these differences for security?
  • Why is it important to involve ethical hackers in the testing of QKD systems, and what role do they play in identifying and mitigating vulnerabilities?
  • What are the main differences between intercept-resend attacks and photon number splitting attacks in the context of QKD systems?
  • How does the Heisenberg uncertainty principle contribute to the security of Quantum Key Distribution (QKD)?
  • How does the deployment of quantum communication satellites enhance the feasibility of global Quantum Key Distribution (QKD), and what are the technical considerations involved in such implementations?

View more questions and answers in EITC/IS/QCF Quantum Cryptography Fundamentals

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/QCF Quantum Cryptography Fundamentals (go to the certification programme)
  • Lesson: Practical Quantum Key Distribution (go to related lesson)
  • Topic: Quantum hacking - part 2 (go to related topic)
  • Examination review
Tagged under: Cybersecurity, Decoy States, PNS Attack, QKD, Quantum Cryptography, Single-Photon Sources
Home » Cybersecurity / EITC/IS/QCF Quantum Cryptography Fundamentals / Examination review / Practical Quantum Key Distribution / Quantum hacking - part 2 » What is the Photon Number Splitting (PNS) attack, and how does it constrain the communication distance in quantum cryptography?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (106)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Reddit publ.)
  • About
  • Contact
  • Cookie Policy (EU)

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on Twitter
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF), governed by the EITCI Institute since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    Follow @EITCI
    EITCA Academy

    Your browser doesn't support the HTML5 CANVAS tag.

    • Web Development
    • Quantum Information
    • Cloud Computing
    • Artificial Intelligence
    • Cybersecurity
    • GET SOCIAL
    EITCA Academy


    © 2008-2026  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?
    We will reply here and by email. Your conversation is tracked with a support token.