Blinding Attack with Faked States

In the Blinding and Faked States Attack on quantum key distribution systems, the threat actor (Eve) uses a combination of blinding techniques to manipulate the receiver's (Bob's) single-photon detectors from operating in their sensitive Geiger mode to a less sensitive linear mode. This manipulation allows Eve to resend light pulses, either classical or quantum, that force Bob's detectors to click only when his basis matches Eve's intended choice, effectively allowing Eve to control the key generation process without introducing errors.


QID: A-0070
Tier: T0
Type: Quantum
Tactic: Execution
Created: 2024-04-10
Updated: 2024-05-24

Technique → Countermeasures

List of countermeasures applicable to this technique.

Items: 3
Description Countermeasure

Use of other protocols, such as MDI-QKD.

Monitoring of various aspects of the detector

The watchdog at the receiver side can take a certain fraction of the incoming signal to monitor it.