In Singapore I was working with the free-space quantum key distribution (QKD) implementation. Here a free space transmission path is used. We were able to extend the experiments to daylight operation by implementing spectral, spatial and temporal filtering techniques. It is possible to establish a secure key continuously over several days under varying light and weather conditions.
Digging more into the techniques of single photon detection I researched on a van-Enk phreaking attack on the polarization detector, but an optical attack was shown to be more successful. Here a physical imperfection (detector vulnerability) was used. We have successfully built an intercept-resend attack and demonstrated eavesdropping under realistic conditions on an installed quantum key distribution line.
Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key. To test the randomness of bitstreams in quantum key distribution, I implemented the NIST random number testsuite in Mathematica and Python. For further details on random number testing, see
here.