?
Уязвимости реализаций систем квантовой криптографии
Authors consider vulnerabilities of quantum cryptography and quantum key distribution systems. Despite
of reliability on quantum communication line as such, direction of successful hacker’s attack is transmitting data
software, or vulnerabilities in hardware–and–software implementation of quantum key distribution systems. For
domestic quantum technologies application, it is possible to use Russian certified encryption systems («Kuznechik»,
GOST 34.12–2015, or «Magma», GOST 28147–89), which contributes to import substitution state policy
development. Different types of coherent and incoherent cyberattacks, based on photons interception and re–
transmission, on quantum samples mixing–up are described. Blinding attack of single–photon receiver detector
and possible protection against it, associated with installation of single photon source in front of detector, which
operating at random time moments, was considered. Attack of photon separation and protection against it, associated
with using of ideal photon sources or with quantum protocol BB84 modification, was analyzed. Possibility of hacker
to replace quantum channel with losses – to channel without losses, which will allow attacker to get information
about key, to read successfully all transmitted data, without making errors. In practice, only quantum channels with
high transmission coefficient should be used, which will avoid successful application of such attack. Attack of
«quantum Trojan» type, which consists in sending of bright light ray to recipient and further analyzing returned ray,
is investigated. This attack can restore the key, and to protect against it, installing detector–monitor that randomly
redirects some of incoming signals to receiver’s detector is necessary. Effective solution is constant monitoring
avalanche LE Ds of receiver in real time. Despite apparent perfection, in practice there are many vulnerabilities, gaps
and security holes in structure of communication channel, which does not guarantee the protection of transmitted
data from hackers attacks.