{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T23:08:02Z","timestamp":1721344082171},"reference-count":26,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>A typical structure of an auto-compensation system for quantum key distribution is given. The principle of operation of a fiber-optic system for the distribution of quantum keys with phase coding of photon states is described. The operation of the system in the synchronization mode and the formation of quantum keys was investigated. The process of detecting a time interval with an optical synchronization pulse is analyzed. The structural scheme of the experimental stand of the quantum-cryptographic network is given. Data are obtained that attest to the presence of a multiphoton signal during the transmission of sync pulses from the transceiver station to the coding and backward direction. The results of experimental studies are presented, which prove the existence of a vulnerability in the process of synchronization of the quantum key distribution system. It is shown that the use of a multiphoton optical pulse as a sync signal makes it possible for an attacker to unauthorized access to a quantum communication channel. The experimental results show that tapping a portion of the optical power from the quantum communication channel during the synchronization process allows an attacker to remain unnoticed while the quantum protocol is operating. Experimentally proved the possibility of introducing malfunctions into the operation of the quantum communication system at the stage of key formation, while remaining invisible for control means.<\/jats:p>","DOI":"10.4018\/ijcac.2019010104","type":"journal-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T23:42:17Z","timestamp":1542066137000},"page":"50-58","source":"Crossref","is-referenced-by-count":7,"title":["Vulnerability of the Synchronization Process in the Quantum Key Distribution System"],"prefix":"10.4018","volume":"9","author":[{"given":"A. P.","family":"Pljonkin","sequence":"first","affiliation":[{"name":"Southern Federal University, Taganrog, Russia"}]}],"member":"2432","reference":[{"key":"IJCAC.2019010104-0","doi-asserted-by":"crossref","unstructured":"Alomari, E., Manickam, S., Gupta, B. B., Karuppayah, S., & Alfaris, R. (2012). Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art. arXiv:1208.0403","DOI":"10.5120\/7640-0724"},{"key":"IJCAC.2019010104-1","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2015070103"},{"key":"IJCAC.2019010104-2","first-page":"3","article-title":"Experimental quantum cryptography.","volume":"5(1)","author":"Bennett, C. H., Bessette, F., Brassard, G., Salvail, L., & Smolin, J.","year":"1992","journal-title":"Journal of Cryptology"},{"issue":"4","key":"IJCAC.2019010104-3","doi-asserted-by":"crossref","first-page":"4609","DOI":"10.1007\/s11042-017-4742-6","article-title":"A novel approach to defend multimedia flash crowd in cloud environment.","volume":"77","author":"K.Bhushan","year":"2018","journal-title":"Multimedia Tools and Applications"},{"issue":"(1","key":"IJCAC.2019010104-4","first-page":"351","article-title":"Quantum cryptography beyond quantum key distribution.","volume":"78","author":"A.Broadbent","journal-title":"Designs, Codes and Cryptography"},{"key":"IJCAC.2019010104-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04831-9"},{"key":"IJCAC.2019010104-6","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2017070101"},{"key":"IJCAC.2019010104-7","first-page":"1","article-title":"GS QKD 002 - V1.1.1 - Quantum Key Distribution; Use Cases.","volume":"1","author":"Q. K.Distribution","year":"2010","journal-title":"Innovation"},{"key":"IJCAC.2019010104-8","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"IJCAC.2019010104-9","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-0105-3","author":"B.Gupta","year":"2016","journal-title":"Handbook of research on modern cryptographic solutions for computer and cyber security"},{"issue":"4","key":"IJCAC.2019010104-10","doi-asserted-by":"crossref","first-page":"4829","DOI":"10.1007\/s11042-016-3735-1","article-title":"XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud.","volume":"77","author":"S.Gupta","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"IJCAC.2019010104-11","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.2017010101"},{"key":"IJCAC.2019010104-12","first-page":"54","article-title":"Quantum Cryptography Experimental Investigations.","volume":"5","author":"V.Kurochkin","year":"2012","journal-title":"Photonics"},{"key":"IJCAC.2019010104-13","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2010.214"},{"key":"IJCAC.2019010104-14","unstructured":"Makarov, V. (2007). Quantum cryptography and quantum cryptanalysis [doctoral thesis]. Norwegian University of Science and Technology."},{"key":"IJCAC.2019010104-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTICT.2016.7514637"},{"key":"IJCAC.2019010104-16","doi-asserted-by":"publisher","DOI":"10.1109\/EWDTS.2016.7807623"},{"key":"IJCAC.2019010104-17","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography1030018"},{"key":"IJCAC.2019010104-18","doi-asserted-by":"publisher","DOI":"10.1145\/3058060.3058078"},{"key":"IJCAC.2019010104-19","doi-asserted-by":"publisher","DOI":"10.1109\/WRAP.2015.7805988"},{"key":"IJCAC.2019010104-20","doi-asserted-by":"publisher","DOI":"10.1109\/ELINFOCOM.2016.7562955"},{"issue":"166","key":"IJCAC.2019010104-21","first-page":"135","article-title":"Security of synchronization mode of quantum keys distribution system. Izvestiya SFedU.","volume":"5","author":"K. Y.Rumyantsev","year":"2015","journal-title":"Engineering and Science"},{"key":"IJCAC.2019010104-22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.250505"},{"issue":"1","key":"IJCAC.2019010104-23","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1088\/1367-2630\/4\/1\/341","article-title":"Quantum key distribution over 67 km with a plug&play system.","volume":"4","author":"D.Stucki","year":"2002","journal-title":"New Journal of Physics"},{"key":"IJCAC.2019010104-24","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1849-x"},{"key":"IJCAC.2019010104-25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2528227"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=218153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T20:28:25Z","timestamp":1651782505000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2019010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":26,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2019010104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}