Industrial Case Phd Studentship On Implementation - Cambridge, United Kingdom - Toshiba EMEA

Toshiba EMEA
Toshiba EMEA
Verified Company
Cambridge, United Kingdom

3 weeks ago

Tom O´Connor

Posted by:

Tom O´Connor

beBee Recruiter


Description

There is currently great interest in using quantum communications to secure telecom networks, as well as to link quantum processors together to build a distributed quantum computer.

Quantum communications such as Quantum Key Distribution (QKD) at TEUR is based on the transmission of single photons through an optical channel, such as an optical fibre.

Quantum mechanics provides security through the ability to detect eavesdropping which is not possible in conventional asymmetric key sharing schemes.

Furthermore, security in QKD can be quantified through the security parameter.

TEUR's proprietary QKD protocol known as T12 has an associated security parameter of around 10-10 which roughly translates into one key "failure" in 30,000 years [1].

Faithful implementation of the protocol in the QKD system is of paramount importance to guarantee the security parameter.

If there are gaps between the protocol and the implementation then these differences can produce side-channels which an adversary can exploit to learn the content of the shared secret key.

Common QKD side-channels can lead to attacks such as Trojan horse attacks [2] on the encoding and decoding modulators in the QKD transmitter and receiver respectively and single photon detector blinding.

Identifying these side-channels and coming up with appropriate countermeasures is normally referred to as the topic of Implementation Security. Over the years TEUR has played a key role in plugging these side-channels [- 5]. Furthermore TEUR is currently involved in implementation security standardisation work both in Europe and Japan.

The resulting standards will provide criteria which QKD systems should adhere to so they can be formally security certified by appropriate test laboratories.


References
[1] "Efficient decoy-state quantum key distribution with quantified security," M. Lucamarini _et al._ Opt. Express,
21

[2] "Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution," M. Lucamarini _et al._ Phys. Rev. X,
5,

[3] "Quantum key distribution with hacking countermeasures and long term field trial," A. R. Dixon _et al._ Sci. Rep.,
7,

[4] " Testing the photon-number statistics of a quantum key distribution light source," J. F. Dynes _et al._ Opt. Express,
26

[5] "Best-Practice Criteria for Practical Security of Self-Differencing Avalanche Photodiode Detectors in Quantum Key Distribution," A. Koehler-Sidki _et al._ Phys. Rev. Applied,
9

More jobs from Toshiba EMEA