564 Classical and quantum cr yptography
between 10
−2
and 10
−6
. A “giant” light pulse, with 10
2
− 10
6
photons, may provide
Eve some information about Alice’s and Bob’s choices of X and Z bases, as based on
the polarization state (, ↔, ∩, ∪) of the reflected pulse. Additionally, such a probing
is performed at a wavelength different from that used by Alice and Bob, so that Eve’s
probing action may remain essentially unnoticed. This type of “side-channel” attack
illustrates that QKD’s absolute security may be challenged by classical means, and
that great care must be taken in any physical inplementation of QKD to eliminate the
possibility of any side channels.
Another form of attack, which is far more straightforward, is for Eve to sever the
photon communication channel physically. This is referred to as the denial-of-service
attack (DoSA). The contingency plan for Alice and Bob would be to resort to classical
cryptosystems and network means, exposing themselves to ordinar y forms of classical
security attack. Finally, the weakest point in a quantum cryptosystem is not the link,
which, as we have seen, cannot be tampered with, without triggering alarms, but the
terminals themselves. Since these terminals must be connected to a network of some
kind, they are potentially exposed to attacks, for instance “spy” viruses, which can detect
the keys that are exchanged between Alice and Bob. Considering these possibilities, is
it possible to state that a quantum cryptosystem is absolutely secure? The answer is yes,
but only within a certain set of assumptions regarding the security of the other elements
in which the cryptosystem is embedded. The worst situation for Alice and Bob would be
to trust, in absolute confidence, a s ystem that could be wired without their awareness.
An element that remains central to the discussion about cryptosystem security is the
criticality of the application: what information must be protected, and how critical is the
communication success? In situations of conflict, where all the communications means
(civilian or military) may be disabled, denied, or destroyed, there must always remain
one way or another for communicating critical information. The cryptosystem must be
able to borrow multiple, if not redundant, paths, just as with the Internet protocol. It must
also be able to reach Alice or Bob anywhere they may happen to be, supposedly not in a
predefined place. Notwithstanding its inherent strength, QKD remains a point-to-point,
local cryptosystem whose extension at global scales and possibilities for path redundancy
seem impractical. Furthermore, a classical communication channel is always required
for Alice and Bob to compare measurements and agree on the secret key. The main
assumption of QKD is that such a channel is always available, and resilient against any
form of attack, and in realistic conflict situations this fact cannot be taken for granted!
Finally, it is important to stress that despite the availability of provably-secure QKD
protocols, the core cryptosystems eventually used in any classical message/ciphertext
channels (DES, AES, and future upgrades) remain 100% exposed to conventional attacks
(cryptanalysis, code-cracking . . .). Thus, channel security ultimately rests upon the
classical notion of “code invulnerability”, which represents a “reasonable conjecture”
within a cryptosystem’s lifetime.
This discussion leads to the closing conclusion that despite its awesome conceptual
elegance, quantum cryptography (or QKD) only represents a supplemental technique of
information protection, to be situated somewhere within the grander domain of global
network security, where there exists no such a thing as “absolute” confidence in any
cryptosystems.