Anti-attack detection method and device for laser transmitter of quantum secret communication system

文档序号:1469776 发布日期:2020-02-21 浏览:4次 中文

阅读说明:本技术 量子保密通信系统激光发射器的抗攻击检测方法及装置 (Anti-attack detection method and device for laser transmitter of quantum secret communication system ) 是由 黄安琪 武志豪 吴俊杰 徐平 强晓刚 丁江放 邓明堂 付祥 于 2019-10-31 设计创作,主要内容包括:本发明公开了一种量子保密通信系统激光发射器的抗攻击检测方法及装置,包括抗攻击检测设备,所述抗攻击检测设备包括连接器、种子光制备模块、结果分析模块,通过比对波形图一与波形图二得到激光的波形图以及偏振态,波长的信息,若两波形图在脉宽、脉冲光能量、脉冲产生时间上大于预设阈值一,各探测器的平均计数个数在被检测后大于预设阈值二,射出光的光波长大于预设阈值三,则判定发射方的激光发射器存在种子光注入控制漏洞,即会被攻击者的注入光所控制,若输出光在上述方面均无明显差异,则该激光发射器无漏洞。本发明实现对QKD系统中发射端的激光发射器是否存在种子光注入攻击漏洞,对QKD系统的实际安全性提供了直接保障。(The invention discloses an anti-attack detection method and device for a laser emitter of a quantum secure communication system, and the device comprises anti-attack detection equipment, wherein the anti-attack detection equipment comprises a connector, a seed light preparation module and a result analysis module, the oscillogram, the polarization state and the wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the pulse width, the pulse light energy and the pulse generation time of the two oscillograms are larger than a preset threshold I, the average counting number of each detector is larger than a preset threshold II after being detected, the wavelength of emitted light is larger than a preset threshold III, the existence of a seed light injection control leak in the laser emitter of an emitting party is judged, namely the laser emitter is controlled by the injected light of an attacker, and if the output light has no obvious difference in the aspects, the laser emitter has no leak. The invention realizes whether the laser emitter at the emitting end in the QKD system has seed light injection attack loopholes or not, and provides direct guarantee for the actual safety of the QKD system.)

1. An anti-attack detection method for a laser transmitter of a quantum secret communication system is characterized by comprising the following steps:

step 1), recording the average counting number of each detector of the quantum key distribution system in an undisturbed original state, and recording the average counting number as an original counting number n1

Step 2), obtaining a laser emitting port of a laser emitter at a legal sending end in the quantum key distribution system through the description of an equipment manufacturer, and cutting off the connection between the laser emitter in an undisturbed original state and the rest devices of the quantum key distribution system;

step 3), sequentially accessing a laser emitting port of the laser emitter which is cut off in the step 2) and connected with the rest device of the quantum key distribution system into an optical power meter, an oscilloscope and a frequency spectrograph, and detecting the characteristics of original state laser emitted by the laser emitter to obtain optical power I, oscillogram I and wavelength I lambda 1;

step 4), a continuous beam of interference light with specific wavelength, specific light intensity and specific polarization is emitted to enter a laser emitter to guide the laser emitter to emit detection light with specific light intensity;

step 5), respectively accessing the light emitted by the laser emitter into an optical power meter, an oscilloscope and a frequency spectrograph again to detect the characteristics of the light emitted by the laser emitter at the moment to obtain a second optical power, a second oscillogram and a second wavelength lambda 2; connecting the laser emitter with the rest of the quantum key distribution system, inputting the detection light into the rest of the quantum key distribution system, recording the counting number of each detector at the detector end at the moment, and recording the counting number as n after interference2

Step 6), the second optical power, the second oscillogram, the second wavelength lambda 2 and the number n of counted disturbed elements are calculated2With the original optical power I, the waveform diagram I, the wavelength I1 andnumber of primitive counts n1Carrying out comparison;

the method comprises the steps that a oscillogram, a polarization state and wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms are larger than a preset threshold I in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is larger than a preset threshold II after being detected, the wavelength of emitted light is larger than a preset threshold III, it is judged that a laser emitter of an emitting party has a seed light injection control leak, namely the laser emitter can be controlled by injected light of an attacker, and if output light has no obvious difference in the aspects, the laser emitter has no leak.

2. The method for detecting attack resistance of a laser transmitter in a quantum secure communication system according to claim 1, wherein: step 3), connecting an outlet of the laser transmitter with an optical power meter, and testing an initial optical power value to obtain a first optical power; and connecting an output port of the laser transmitter with the photoelectric converter and the frequency spectrograph in sequence to obtain the wavelength lambda 1 of the original state laser emitted by the laser transmitter.

3. The method for detecting attack resistance of a laser transmitter in a quantum secure communication system according to claim 2, wherein: the energy carried by the interference light in the step 4) is equal to the energy required by the stimulated radiation to radiate specific detection light.

4. The method for detecting attack resistance of a laser transmitter in a quantum secure communication system according to claim 3, wherein: and 4) making the interference light by a tunable laser transmitter.

5. The method for detecting attack resistance of a laser transmitter in a quantum secure communication system according to claim 4, wherein: the specific polarization state of the interference light in the step 4) is made by a polarization controller.

6. The method for detecting attack resistance of a laser transmitter in a quantum secure communication system according to claim 5, wherein: in the step 4), the emitted interference light with the specific wavelength, the specific light intensity and the specific polarization is incident to the laser emitter, the optical power meter is used for testing the optical power of the output detection light, if the optical power meter has a number, the processes of the step 4) and the step 5) are continuously executed, and if not, the detection is ended.

7. An anti attack detection device of quantum secret communication system laser emitter which characterized in that: the system comprises anti-attack detection equipment, wherein the anti-attack detection equipment comprises a connector, a seed light preparation module and a result analysis module;

the connector is used for connecting the seed light preparation module, the result analysis module and the laser emitter, and comprises a first interface, a second interface and a third interface, wherein the first interface is used for being connected with the seed light preparation module; the interface II is used for being connected with a laser transmitter; the interface III is used for being connected with the result analysis module;

the result analysis module comprises an optical power meter, an oscilloscope, a frequency spectrograph and a central processor;

the seed light preparation module is used for generating interference light with specific light intensity, wavelength and polarization state;

under the original state without interference, the connection between the laser transmitter and the rest devices of the quantum key distribution system is cut off; recording the average counting number of each detector of the quantum key distribution system in an undisturbed original state, and recording the average counting number as an original counting number n1The laser transmitter is connected with the second interface, the result analysis module is connected with the third interface, original state laser emitted by the laser transmitter sequentially enters the optical power meter, the oscilloscope and the frequency spectrometer, and characteristics of the original state laser emitted by the laser transmitter are detected to obtain optical power I, oscillogram I and wavelength I lambda 1;

under the state of interference, the laser transmitter is connected with the rest device of the quantum key distribution system, the counting number of each detector at the detector end at the moment is recorded, and the counting number n is recorded as the counting number after interference2(ii) a The seed light preparation module generates interference light with specific light intensity, wavelength and polarization state, the interference light enters the laser transmitter, and the laser transmitter and the interface IIConnecting, wherein a result analysis module is connected with the interface III, detection light emitted by the laser transmitter under the action of interference light sequentially enters the optical power meter, the oscilloscope and the frequency spectrograph, and the characteristics of the detection light are detected to obtain optical power II, a oscillogram II and wavelength II lambda 2;

the central processor counts the optical power II, the wave form II, the wavelength II lambda 2 and the number n of the interference2The original optical power I, the waveform diagram I, the wavelength I lambda 1 and the original counting number n1Carrying out comparison; the method comprises the steps that a oscillogram, a polarization state and wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms are larger than a preset threshold I in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is larger than a preset threshold II after being detected, the wavelength of emitted light is larger than a preset threshold III, it is judged that a laser emitter of an emitting party has a seed light injection control leak, namely the laser emitter can be controlled by injected light of an attacker, and if output light has no obvious difference in the aspects, the laser emitter has no leak.

8. The apparatus for detecting attack resistance of a laser transmitter in a quantum secure communication system according to claim 7, wherein: the seed light preparation module comprises a laser emission unit and a polarization modulation unit, wherein the laser emission unit is used for emitting laser with specific light intensity and wavelength, and the polarization modulation unit is used for modulating the polarization state of light.

Technical Field

The invention belongs to the technical field of quantum secret communication, and particularly relates to an anti-attack detection method and an anti-attack detection device for a laser transmitter at a transmitting end of a quantum secret communication system.

Background

In the information age, information security is crucial to both individuals and countries. However, the ultra-strong computing power of quantum computers will impact the foundation of modern information security and network security, for example, a series of security systems based on RSA algorithm, which are widely used at present, will not be overcome. In order to deal with the security threat of the quantum computer to the classic password basic system, the replacement of the existing classic password system into the password system of quantum security is an important strategic measure. Quantum cryptography is based on the fundamental physics of quantum mechanics, and not on any mathematical assumptions. Therefore, quantum cryptography is able to resist quantum attacks by quantum computers and has been proven to achieve information theoretical security, known as unconditional security. Quantum cryptography is most typically Quantum Key Distribution protocol (QKD) (briefly shown in fig. 1), which solves an important problem that is difficult to solve in classical cryptography: the symmetric key pair is securely distributed over an insecure channel to both legitimate communication parties. QKD ensures that a key carried by a quantum state cannot be eavesdropped on an insecure channel by using the quantum physical unclonable principle, and is based on the quantum physical basic principle only and not on any mathematical hypothesis, so that the key is theoretically proved to achieve information theoretical security, namely unconditional security generally known by us. This is a level of security not achieved by classical encryption algorithms based on mathematical assumptions. Due to the obvious advantages of QKD in safety compared with classical passwords, the QKD attracts attention in quantum information technology leather and is rapidly developed in all aspects. With the continuous development of quantum cryptography, researchers find that many differences exist between theory and reality in the process of experiment and practicality. This is particularly due to the fact that in security proof, there are a number of assumptions that quantum cryptography systems need to satisfy and abstract mathematical models of actual devices, which, however, are likely to not match actual devices. For example, some security assumptions cannot be met in practice; or the model does not fully describe the actual QKD device. In the standard preparative-survey QKD system architecture it is assumed that an eavesdropper (Eve) can only have access to the quantum channel with authority, but cannot enter the preparation and transmitting (Alice) and quantum state receiving and detecting (Bob) parties of the quantum state. In practice, however, Eve may steal the key through quantum channels and exploit security vulnerabilities of aspects of the system. Most existing attack methods are attacks on a detector at the Bob end and on the whole transmission path, such as blind attacks of continuous light and pulse light, time-shifting attacks, dead-time attacks and the like. These attack methods all pose a threat to the perceived security of the system, and if such a security system full of vulnerabilities is applied to practice, a lot of loss is caused, so that the security of each system must be detected. Many experts have already developed many detection methods and devices in the related art, which play a great role in the progress of QKD system.

The various vulnerability detection methods for the QKD system are all detection for the detection end. For most problems in the existing QKD technology, the MDI-QKD (measurement-device-independent quantum key distribution) proposed by Lo et al of the university of toronto 2012 thoroughly closes the loopholes of all measuring ends of the QKD system. And (2) in the MDI-QKD, enabling Alice and Bob of two communication parties to randomly prepare BB84 weak coherent states respectively, then sending to an untrusted third party Charlie to perform Bell state measurement, and establishing a safe secret key according to Bell state measurement results Alice and Bob published by the Charlie. The basic principle of polarization encoded MDI-QKD is shown in FIG. 2. The basic operation flow is as follows: alice and Bob prepare phase-randomized weak coherent light pulses and randomly encode them into one of four BB84 states, here selecting four polarization states | H >, | V >, | + >, | - >, where H/V represents horizontal and vertical polarization, | ± > (| H > ± | V >)/√ 2, respectively. Alice and Bob then send the prepared quantum states to an untrusted third party Charlie through a quantum channel for bell state measurement. Charlie publishes successful bell state measurements and Alice and Bob publish the basis vectors they encode for use. For the part they use the same basis vector, Alice or Bob chooses to flip or not flip the bits in their hand to get the positive associated data, according to Charlie's bell state measurements. And then they obtain the gain and the bit error rate of a single-photon part according to a decoy state method, and obtain a final security key through classical error correction and privacy amplification processes. Since the MDI QKD system can avoid all probe vulnerability, the source security issue will be of great concern. We need to detect the relevant security of the transmitting end for both this more advanced QKD system and most previous QKD systems. The anti-attack detection is the last guarantee for avoiding the problem of information security, and has important scientific significance and practical value for the practicability of various types of QKD.

Disclosure of Invention

The purpose of the invention is as follows: in view of the fact that all transmitting ends in the QKD system based on the weak coherent state use laser emitters, aiming at the possible security loopholes of the laser emitters, the invention provides an anti-attack detection method and an anti-attack detection device of the laser emitter of the quantum secret communication system.

The technical scheme is as follows: in order to achieve the purpose, the invention adopts the technical scheme that:

an anti-attack detection method for a laser transmitter of a quantum secret communication system comprises the following steps:

step 1), recording the average counting number of each detector of the quantum key distribution system in an undisturbed original state, and recording the average counting number as an original counting number n1

And 2) obtaining a laser emitting port of a laser emitter at a legal sending end in the quantum key distribution system through the description of the equipment manufacturer, and cutting off the connection between the laser emitter in an undisturbed original state and the rest devices of the quantum key distribution system.

And 3), sequentially accessing a laser emitting port of the laser emitter which is cut off in the step 2) and connected with the rest device of the quantum key distribution system into an optical power meter, an oscilloscope and a frequency spectrograph, and detecting the characteristics of the laser in the original state emitted by the laser emitter to obtain optical power I, oscillogram I and wavelength I lambda 1.

And 4), emitting a continuous beam of interference light with specific wavelength, specific light intensity and specific polarization into the laser emitter to guide the laser emitter to emit detection light with specific light intensity.

And 5) respectively accessing the light emitted by the laser emitter into the optical power meter, the oscilloscope and the frequency spectrograph again to detect the characteristics of the light emitted by the laser emitter at the moment to obtain a second optical power, a second oscillogram and a second wavelength lambda 2. Connecting the laser emitter with the rest of the quantum key distribution system, inputting the detection light into the rest of the quantum key distribution system, recording the counting number of each detector at the detector end at the moment, and recording the counting number as n after interference2

Step 6), the second optical power, the second oscillogram, the second wavelength lambda 2 and the number n of counted disturbed elements are calculated2The original optical power I, the waveform diagram I, the wavelength I lambda 1 and the original counting number n1And (6) carrying out comparison.

The method comprises the steps that a oscillogram, a polarization state and wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms are larger than a preset threshold I in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is larger than a preset threshold II after being detected, the wavelength of emitted light is larger than a preset threshold III, it is judged that a laser emitter of an emitting party has a seed light injection control leak, namely the laser emitter can be controlled by injected light of an attacker, and if output light has no obvious difference in the aspects, the laser emitter has no leak.

Preferably: and 3) connecting the outlet of the laser transmitter with an optical power meter, and testing the initial optical power value to obtain the first optical power. And connecting an output port of the laser transmitter with the photoelectric converter and the frequency spectrograph in sequence to obtain the wavelength lambda 1 of the original state laser emitted by the laser transmitter.

Preferably: the energy carried by the interference light in the step 4) is equal to the energy required by the stimulated radiation to radiate specific detection light.

Preferably: and 4) making the interference light by a tunable laser transmitter.

Preferably: the specific polarization state of the interference light in the step 4) is made by a polarization controller.

Preferably: in the step 4), the emitted interference light with the specific wavelength, the specific light intensity and the specific polarization is incident to the laser emitter, the optical power meter is used for testing the optical power of the output detection light, if the optical power meter has a number, the processes of the step 4) and the step 5) are continuously executed, and if not, the detection is ended.

An anti-attack detection device of a laser transmitter of a quantum secret communication system comprises anti-attack detection equipment, wherein the anti-attack detection equipment comprises a connector, a seed light preparation module and a result analysis module.

The connector is used for connecting the seed light preparation module, the result analysis module and the laser emitter, and comprises an interface I, an interface II and an interface III, wherein the interface I is used for being connected with the seed light preparation module. And the second interface is used for connecting with the laser transmitter. And the interface III is used for being connected with the result analysis module.

The result analysis module comprises an optical power meter, an oscilloscope, a frequency spectrograph and a central processor.

The seed light preparation module is used for generating interference light with specific light intensity, wavelength and polarization state.

Is in at restIn the original state of interference, the connection between the laser transmitter and the rest devices of the quantum key distribution system is cut off. Recording the average counting number of each detector of the quantum key distribution system in an undisturbed original state, and recording the average counting number as an original counting number n1The laser transmitter is connected with the second interface, the result analysis module is connected with the third interface, original state laser emitted by the laser transmitter sequentially enters the optical power meter, the oscilloscope and the frequency spectrometer, and characteristics of the original state laser emitted by the laser transmitter are detected to obtain optical power I, oscillogram I and wavelength I lambda 1.

Under the state of interference, the laser transmitter is connected with the rest device of the quantum key distribution system, the counting number of each detector at the detector end at the moment is recorded, and the counting number n is recorded as the counting number after interference2. The seed light preparation module generates interference light with specific light intensity, wavelength and polarization state, the interference light is incident to the laser transmitter, the laser transmitter is connected with the second interface, the result analysis module is connected with the third interface, detection light emitted by the laser transmitter under the action of the interference light sequentially enters the optical power meter, the oscilloscope and the frequency spectrometer, and the characteristics of the detection light are detected to obtain optical power II, oscillogram II and wavelength II lambda 2.

The central processor counts the optical power II, the wave form II, the wavelength II lambda 2 and the number n of the interference2The original optical power I, the waveform diagram I, the wavelength I lambda 1 and the original counting number n1And (6) carrying out comparison. The method comprises the steps that a oscillogram, a polarization state and wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms are larger than a preset threshold I in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is larger than a preset threshold II after being detected, the wavelength of emitted light is larger than a preset threshold III, it is judged that a laser emitter of an emitting party has a seed light injection control leak, namely the laser emitter can be controlled by injected light of an attacker, and if output light has no obvious difference in the aspects, the laser emitter has no leak.

Preferably: the seed light preparation module comprises a laser emission unit and a polarization modulation unit, wherein the laser emission unit is used for emitting laser with specific light intensity and wavelength, and the polarization modulation unit is used for modulating the polarization state of light.

Compared with the prior art, the invention has the following beneficial effects:

the invention aims at carrying out attack-resistant detection on a Quantum Key Distribution (QKD) system adopting a coherent laser emitter, realizes whether a laser emitter at an emitting end in the QKD system has seed light injection attack holes or not for the first time, provides direct guarantee for the actual safety of the QKD system, has important guiding significance for promoting the research of the laser emitter in the actual application and the research of the safety and the reliability in quantum secret communication, and has important scientific significance and practical value for promoting the practicability of the QKD system.

Drawings

Fig. 1 is a schematic diagram of a quantum key distribution system.

FIG. 2 is a schematic diagram of MDI-QKD.

Fig. 3 is a schematic view of attack detection.

FIG. 4 is a schematic view of a seed light preparation module.

FIG. 5 is a schematic diagram of a result analysis module.

Detailed Description

The present invention is further illustrated by the following description in conjunction with the accompanying drawings and the specific embodiments, it is to be understood that these examples are given solely for the purpose of illustration and are not intended as a definition of the limits of the invention, since various equivalent modifications will occur to those skilled in the art upon reading the present invention and fall within the limits of the appended claims. In order to facilitate the user to use the attack detection device better, the actual use process is described herein particularly in combination with the attack detection schematic diagram and the specific diagrams of each module.

An anti-attack detection method of a quantum secret communication system laser transmitter is implemented by simulating the attack behavior of an attacker, and the process comprises the following steps:

step 1), recording the average counting number of each detector of the quantum key distribution system in an undisturbed original state, and recording the average counting number as an original counting number n1

And 2) obtaining a laser emitting port of a laser emitter at a legal sending end in the quantum key distribution system through the description of the equipment manufacturer, and cutting off the connection between the laser emitter in an undisturbed original state and the rest devices of the Quantum Key Distribution (QKD) system.

And 3), sequentially accessing a laser emitting port of the laser emitter which is cut off in the step 2) and connected with the rest device of the quantum key distribution system into an optical power meter, an oscilloscope and a frequency spectrograph, and detecting the characteristics of the laser in the original state emitted by the laser emitter to obtain optical power I, oscillogram I and wavelength I lambda 1. And connecting the outlet of the laser transmitter with an optical power meter, and testing the initial optical power value to obtain the first optical power. The output port of the laser transmitter is sequentially connected with the photoelectric converter and the oscilloscope in the result detection unit to obtain a first oscillogram of original light emitted by the laser transmitter, and the output port of the laser transmitter is sequentially connected with the photoelectric converter and the frequency spectrograph to obtain a first wavelength lambda 1 of original state laser emitted by the laser transmitter.

And 4), operating a seed light preparation module of the anti-attack detection device, modulating light with specific wavelength, light intensity and polarization, and transmitting a continuous beam of interference light with specific wavelength, specific light intensity and specific polarization to enter a laser transmitter to guide the laser transmitter to emit detection light with specific light intensity. The interfering light carries an energy equal to the energy required for the stimulated radiation to emit the specific detection light. The interfering light is made by a tunable laser transmitter. The specific polarization states of the disturbing light include four polarization states | H >, | V >, | + >, | - >, which are generally made by two different polarization modulators PBS. Emitting interference light with specific wavelength, specific light intensity and specific polarization into a laser emitter, testing the optical power of the output detection light by using an optical power meter, and if the optical power meter has a number, continuing to execute the processes of the step 4) and the step 5), otherwise, ending the detection.

And 5) respectively accessing the light emitted by the laser emitter into the optical power meter, the oscilloscope and the frequency spectrograph again to detect the characteristics of the light emitted by the laser emitter at the moment to obtain a second optical power, a second oscillogram and a second wavelength lambda 2. Connecting the laser emitter with the rest quantum key distribution system, and inputting the detection light to the rest quantum key distribution systemIn the rest quantum key distribution system, the counting number of each detector at the detector end at the moment is recorded and recorded as the counting number n after interference2

Step 6), the second optical power, the second oscillogram, the second wavelength lambda 2 and the number n of counted disturbed elements are calculated2The original optical power I, the waveform diagram I, the wavelength I lambda 1 and the original counting number n1And (6) carrying out comparison.

The oscillogram, the polarization state and the wavelength information of the laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms have obvious difference in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is obviously increased after being detected, and the wavelength of the emitted light has obvious difference, the laser emitter of the emitting party is judged to have seed light injection control loopholes, namely, the laser emitter is controlled by the injected light of an attacker, and if the output light has no obvious difference in the aspects, the laser emitter has no loopholes. Specifically, a oscillogram, a polarization state and wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms are larger than a preset threshold I in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is larger than a preset threshold II after being detected, and the wavelength of emitted light is larger than a preset threshold III, it is determined that a laser emitter of an emitting party has a seed light injection control leak, namely, the laser emitter is controlled by injected light of an attacker, and if output light has no obvious difference in the aspects, the laser emitter has no leak.

An anti-attack detection device for a laser transmitter of a quantum secure communication system, the quantum secure communication is realized based on a quantum key distribution system using the laser transmitter as a quantum signal sending unit, as shown in fig. 3, the anti-attack detection device comprises an anti-attack detection device, and the anti-attack detection device comprises a plurality of modules. And judging whether the laser emitter has a vulnerability of the laser emitter for resisting seed light injection attack according to the function of each module and the result of the specified step. The anti-attack detection device comprises a connector, a seed light preparation module and a result analysis module.

The connector is used for connecting the seed light preparation module, the result analysis module and the laser emitter, and comprises an interface I, an interface II and an interface III, wherein the interface I is used for being connected with the seed light preparation module. And the second interface is used for connecting with the laser transmitter. And the interface III is used for being connected with the result analysis module. The light entering from the first interface can only be emitted from the second interface, the light emitted from the second interface enters the laser emitter, the light generated by the laser emitter enters the second interface, and the light emitted from the second interface can only be emitted from the third interface.

As shown in fig. 4, the result analysis module is configured to detect the original output light of the laser emitter and the light intensity, waveform, wavelength, and polarization state after being attacked, so as to obtain a first optical power and a second optical power; a first waveform diagram and a second waveform diagram; wavelength one λ 1, wavelength two λ 2, original count number n1Counting the number n after interference2And the result analysis module comprises an optical power meter, an oscilloscope, a frequency spectrograph and a central processor.

As shown in fig. 4, the seed light preparation module is used to generate the interference light with specific light intensity, wavelength and polarization state. The seed light preparation module comprises a laser emission unit and a polarization modulation unit, wherein the laser emission unit is used for emitting laser with specific light intensity and wavelength, and the polarization modulation unit is used for modulating the polarization state of light.

In an undisturbed original state, the connection between the laser transmitter and the rest of the devices of the quantum key distribution system is cut off. Recording the average counting number of each detector of the quantum key distribution system in an undisturbed original state, and recording the average counting number as an original counting number n1The laser transmitter is connected with the second interface, the result analysis module is connected with the third interface, original state laser emitted by the laser transmitter sequentially enters the optical power meter, the oscilloscope and the frequency spectrometer, and characteristics of the original state laser emitted by the laser transmitter are detected to obtain optical power I, oscillogram I and wavelength I lambda 1.

Under the state of interference, the laser transmitter is connected with the rest device of the quantum key distribution system, the counting number of each detector at the detector end at the moment is recorded, and the counting number n is recorded as the counting number after interference2. The seed light preparation module generates specific light intensity and waveAnd detecting the characteristics of the detection light to obtain a second optical power, a second oscillograph and a second wavelength lambda 2.

The central processor counts the optical power II, the wave form II, the wavelength II lambda 2 and the number n of the interference2The original optical power I, the waveform diagram I, the wavelength I lambda 1 and the original counting number n1And (6) carrying out comparison. The method comprises the steps that a oscillogram, a polarization state and wavelength information of laser are obtained by comparing the oscillogram I with the oscillogram II, if the two oscillograms are larger than a preset threshold I in pulse width, pulse light energy and pulse generation time, the average counting number of each detector is larger than a preset threshold II after being detected, the wavelength of emitted light is larger than a preset threshold III, it is judged that a laser emitter of an emitting party has a seed light injection control leak, namely the laser emitter can be controlled by injected light of an attacker, and if output light has no obvious difference in the aspects, the laser emitter has no leak.

The detection device of the invention has the following using method:

A) firstly, recording the average reading number of each detector at the detector end of the quantum key distribution system in the original state as the original counting number n1

B) And (4) correctly connecting the connectors, and respectively connecting the interface I, the interface II and the interface III to the specified module. The interface I is connected with the seed light preparation module, and the interface II is connected with the laser emitter after the laser emitter with the transmitting end interrupted is connected with the residual QKD;

C) the interface three is connected with each instrument in the result analysis unit one by one, wherein,

and connecting the laser transmitter outlet of the legal transmitting end with an optical power meter, and testing the initial optical power value to obtain the optical power 1.

And connecting the output port of the laser transmitter at the legal sending end with the photoelectric converter and the oscilloscope in the result detection unit in sequence to obtain a first oscillogram of the original light emitted by the laser transmitter.

And connecting the output port of the laser transmitter of the legal sending end with the photoelectric converter in sequence, and connecting a frequency spectrograph in the result detection unit to obtain the wavelength lambda 1 of the original initial light of the laser transmitter.

D) And operating a seed light preparation module of the anti-attack detection device, modulating light with specific wavelength, light intensity and polarization, and entering the laser emitter through the connection module.

E) And B) obtaining the characteristics of the output light after the attack, namely the light power II, the oscillogram II and the wavelength II lambda 2.

Connecting the laser transmitter outlet of the legal sending end with the rest QKD system to obtain the average reading of each detector as the number n of counts after interference2

F) And comparing the optical power I with the optical power II, the oscillogram I with the oscillogram II, the wavelength I lambda 1 with the wavelength II lambda 2, and counting the number of the detectors before and after the detectors are tested.

And C) operating as above, if the optical power meter has the indication number, continuing the next operation of D) and E), otherwise, stopping detection.

After comparison in the step E), if the optical power indicator is obviously increased after being attacked, the waveform diagram b of the output light after being attacked is obviously different from the waveform diagram a in pulse width, pulse light energy, pulse generation time and wavelength, the wavelength is obviously changed, and the respective specific difference of the indicators of the detectors determines that the laser transmitter has a leak of anti-violet injection attack, otherwise, the leak does not exist.

As mentioned in C), after the whole step is completed, the input light with different light intensities, wavelengths and polarizations can be modulated to further detect the influence of the light with different light intensities, wavelengths and polarizations on the detected laser emitter, and the process is continued according to a), B), C), D), E), F) above.

This description is written in a progressive manner and can be properly understood with reference to the drawings. The laser modulation part related to the specification can be judged according to actual conditions, and the modulation of light wavelength, polarization and light intensity is realized through software and hardware. The above description is only of the preferred embodiments of the present invention, and it should be noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the invention and these are intended to be within the scope of the invention.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于SPAD阵列非线性的SAR检测方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!