Device and method for resisting attacks in avalanche transition zone

A technology of transition area and multiplexer, which is applied in the countermeasures of attacking encryption mechanism, secure communication device, digital transmission system, etc., and can solve problems such as QKD error code or code rate change

Active Publication Date: 2021-10-08
ANHUI QASKY QUANTUM SCI & TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the position of the gating signal or the arrival delay of the light pulse is changed, the response of the detector will change drastically, which will cause a significant change in the bit error or bit rate of QKD, so as to discover this transition zone attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for resisting attacks in avalanche transition zone
  • Device and method for resisting attacks in avalanche transition zone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as figure 1 , the device for resisting the attack of the avalanche transition zone includes a clock fan-out device, a delay module, a multiplexer device, a random source device and a gate signal generation circuit device; the clock fan-out device detector is used to pass through the detector The starting input signal is divided into two independent clock signals T1 and clock signal T2; the output terminal of the delay module is connected with the input terminal IN1 of the multiplexer, and the delay module is used to delay the clock signal T1 After inputting the multiplexer, the delay amount of the delay module is Δt, and the delay amount Δt is greater than or equal to half of the edge time of the gating signal; the clock signal T2 is connected with the input terminal IN2 of the multiplexer device, and multiple The selection switch S of the selector device is connected with the random source module; the random source module is used to randomly select the input clock...

Embodiment 2

[0046] see figure 1 , the method for resisting the attack of the avalanche transition zone is implemented by means of a device for resisting the attack of the avalanche transition zone, including the following steps:

[0047] The trigger input signal passing through the detector is divided into two independent clock signals T1 and clock signal T2 through the clock fan-out device detector;

[0048] The clock signal T1 is delayed by the delay module and then input to the multiplexer, the delay amount of the delay module is Δt, and the delay amount Δt is greater than or equal to half of the edge time of the gate control signal;

[0049] The clock signal T2 is input to the multiplexer through the input terminal IN2 of the multiplexer device, and the selection switch S of the multiplexer device is connected to the random source module;

[0050] The input clock T1 of the input terminal IN1 or the input clock T2 of the input terminal IN2 is randomly selected by the random source mod...

Embodiment 3

[0052] see figure 2 , the device for resisting the attack of the avalanche transition zone includes a light source input module, a delay controllable optical module, a random source module and a light source output module; the light source input module is connected to the input terminal IN of the delay controllable optical module for Input the light source into the delay controllable optical module; the delay controllable optical module is used to modulate the input light source, so that after the light source is modulated by the delay controllable optical module, it is divided into two different delay times of t or t+Δt Output: The output interface of the random source module is connected to the control terminal S of the delay controllable optical module, and the random source module is used to randomly select the delayed output of t or t+Δt as the final light source output through the light source output module. The delay controllable optical module is an optical controllab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device for resisting the attack of an avalanche transition zone, comprising a clock fan-out device, a delay module, a multiplexer device, a random source device and a gate signal generation circuit device; the clock fan-out device detector is used to The starting input signal through the detector is divided into two independent clock signals T1 and T2; the output terminal OUT of the multiplexer is connected to the gate signal generating circuit, and the minimum delay between the trigger input signal and the gate output signal is t. The output gate signal of the gate signal generation circuit jitters randomly at time t or t+Δt and outputs it to the APD through the output joint J2. The invention also discloses a method for resisting the attack of the avalanche transition zone. The invention can detect that the avalanche transition area is attacked while ensuring the stability of detector counting.

Description

technical field [0001] The invention relates to the field of mid-infrared single-photon detectors in optical fiber quantum key distribution systems, in particular to a device and method for resisting attacks in an avalanche transition zone. Background technique [0002] The quantum cryptography technology based on the basic principles of quantum mechanics is theoretically unconditionally safe. However, with the gradual maturity of the quantum cryptography technology, it is turning to more and more practical applications. Actual security is not as perfect as described in theory. The reason is that there is a gap between the equipment used in the actual system and the theoretical model, such as the imperfection of the light source (not a true single-photon source), the loss on the channel and the non-ideal detector. These imperfections lead to loopholes in the QKD system, and eavesdroppers can take advantage of these loopholes to obtain some or even all keys without being det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G01J11/00H04L9/00H04L9/08
CPCG01J11/00H04L9/002H04L9/0852H04L2209/12
Inventor 徐焕银刘云王宝慧黄敦锋凌杰吕利影马伟朱文正王立霞薛坤
Owner ANHUI QASKY QUANTUM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products