decades in order to maintain adequate levels of communication security. QKD establishes
ITS (Information-Theoretic secure) symmetric keys between the two parties, which they may
use to sustain secure flow of data even in the postquantum era. Since QKD-keys are a
valuable and scarce resource, they must be carefully maintained. This paper investigates
DoS attacks on actual QKD equipment, in which an adversary with access to QKD services …