Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shihan Sajeed is active.

Publication


Featured researches published by Shihan Sajeed.


IEEE Journal of Quantum Electronics | 2016

Testing Random-Detector-Efficiency Countermeasure in a Commercial System Reveals a Breakable Unrealistic Assumption

Anqi Huang; Shihan Sajeed; Poompong Chaiwongkhot; Mathilde Soucarros; Matthieu Legre; Vadim Makarov

In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution. Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantiques random-detector-efficiency countermeasure against detector blinding attacks. As a third-party tester, we have found that the first industrial implementation of this countermeasure is effective against the original blinding attack, but not immune to a modified blinding attack. Then, we implement and test a later full version of this countermeasure containing a security proof. We find that it is still vulnerable against the modified blinding attack, because an assumption about hardware characteristics on which the proof relies fails in practice.


Physical Review A | 2015

Experimental quantum key distribution with source flaws

Feihu Xu; Kejin Wei; Shihan Sajeed; Sarah Kaiser; Shi-Hai Sun; Zhiyuan Tang; Li Qian; Vadim Makarov; Hoi-Kwong Lo

Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be secure in practice. Here, we perform an experiment that for the first time shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments and our theory can be applied to general QKD systems. These features constitute a step towards secure QKD with imperfect devices.


Nature Communications | 2015

Experimental quantum fingerprinting with weak coherent pulses

Feihu Xu; Juan Miguel Arrazola; Kejin Wei; Wenyuan Wang; Pablo Palacios-Avila; Chen Feng; Shihan Sajeed; Norbert Lütkenhaus; Hoi-Kwong Lo

Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.


Physical Review A | 2015

Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

Shihan Sajeed; Igor Radchenko; Sarah Kaiser; Jean-Philippe Bourgoin; Anna Pappa; Laurent Monat; Matthieu Legre; Vadim Makarov

The security of quantum communication using a weak coherent source requires an accurate knowledge of the source’s mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Ac´ 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today’s technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique’s commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.


Physical Review A | 2015

Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

Shihan Sajeed; Poompong Chaiwongkhot; Jean-Philippe Bourgoin; Thomas Jennewein; Norbert Lütkenhaus; Vadim Makarov

In free-space quantum key distribution (QKD), the sensitivity of the receivers detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver and identify sources of efficiency mismatch in its optical scheme. We model a practical intercept-and-resend attack and show that it would break security in most situations. We show experimentally that adding an appropriately chosen spatial filter at the receivers entrance may be an effective countermeasure.


Physical Review A | 2016

Creation of backdoors in quantum communications via laser damage

Vadim Makarov; Jean-Philippe Bourgoin; Poompong Chaiwongkhot; Mathieu Gagné; Thomas Jennewein; Sarah Kaiser; Raman Kashyap; Matthieu Legré; Carter Minshull; Shihan Sajeed

Practical quantum communication (QC) protocols are assumed to be secure provided implemented devices are properly characterized and all known side channels are closed. We show that this is not always true. We demonstrate a laser-damage attack capable of modifying device behavior on demand. We test it on two practical QC systems for key distribution and coin tossing, and show that newly created deviations lead to side channels. This reveals that laser damage is a potential security risk to existing QC systems, and necessitates their testing to guarantee security.


Scientific Reports | 2017

Invisible Trojan-horse attack

Shihan Sajeed; Carter Minshull; Nitin Jain; Vadim Makarov

We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.


arXiv: Quantum Physics | 2017

Finite-key-size effect in a commercial plug-and-play QKD system

Poompong Chaiwongkhot; Shihan Sajeed; Lars Lydersen; Vadim Makarov

A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sifted-key. We also derive a key-rate equation that is specific for this system. This equation provides bounds above the upper bound of secure key under finite-key-size analysis. From this equation and our experimental data, we show that the keys that have been distilled from the smaller sifted-key size fall above our bound. Thus, their security is not covered by finite-key-size analysis. Experimentally, we could consistently force the system to generate the key outside of the bound. We also test manufacturers software update. Although all the keys after the patch fall under our bound, their security cannot be guaranteed under this analysis. Our methodology can be used for security certification and standardization of QKD systems.


Scientific Reports | 2017

Publisher Correction: Invisible Trojan-horse attack

Shihan Sajeed; Carter Minshull; Nitin Jain; Vadim Makarov

A correction to this article has been published and is linked from the HTML version of this paper. The error has been fixed in the paper.


Physical Review Letters | 2016

Insecurity of Detector-Device-Independent Quantum Key Distribution.

Shihan Sajeed; Anqi Huang; Shi-Hai Sun; Vadim Makarov; Marcos Curty; Feihu Xu

Collaboration


Dive into the Shihan Sajeed's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Feihu Xu

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Anqi Huang

University of Waterloo

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge