| Issue |
EPJ Web Conf.
Volume 360, 2026
1st International Conference on “Quantum Innovations for Computing and Knowledge Systems” (QUICK’26)
|
|
|---|---|---|
| Article Number | 01003 | |
| Number of page(s) | 12 | |
| DOI | https://doi.org/10.1051/epjconf/202636001003 | |
| Published online | 23 March 2026 | |
https://doi.org/10.1051/epjconf/202636001003
Photon-Number Splitting (PNS) Attacks in Weak Coherent Pulse QKD: Simulation and Countermeasures
AI & DS Department, Indira Gandhi Delhi Technical University for Women, Delhi, India
* Corresponding author: This email address is being protected from spambots. You need JavaScript enabled to view it.
Published online: 23 March 2026
Abstract
For a start, Quantum Key Distribution offers security not depending on any fundamental assumption. However, actual realizations choose to use weak coherent pulses as photon sources, rather than the ideal single-photon state, which bears security weaknesses due to the emission of sporadic multi-photon states. These states can be used in Photon-Number Splitting (PNS) attacks, where the attacker intercepts and buffers photons of multi-photon pulses and forwards the rest, enabling partial recovery of the key without inducing detectable perturbations. This article presents a simulation-based approach to analyze PNS attacks with realistic channel conditions like losses, detector imperfections, and finite key lengths. The research also examines the performance of decoy-state countermeasures, that use variable-intensity pulses to statistically reveal eavesdropping and Simulation results confirm the dominant character of PNS on raw key rates for the no-countermeasure scenario and ensure optimal decoy-state schemes restore security by cutting single-photon contributions. Results establish that although WCP QKD is vulnerable to PNS attacks in theory, strict adoption of decoy-state protocols aided with monitoring and finite-key analysis can provide immunity against an adversary. The paper emphasizes the need for simulation-based, implementation-dependent security analysis in direction towards well-designed practical quantum cryptographic systems. [1] [2] [3] [4] [10] [8]
Key words: Quantum Key Distribution / Photon-Number Splitting / Weak Coherent Pulses / Decoy-State Protocol / Quantum Cryptography / Security Simulation
© The Authors, published by EDP Sciences, 2026
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

