A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

9 pages, 3 figures. v2: published version

Scientific paper

Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure ``quantum channel'' to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One example is the BB84 protocol, where the quantum channel can be implemented in polarization of single photons. Here, use of several photons instead of one to encode each bit of the key provides a similar but insecure system. For protocols based on violation of a Bell inequality (e.g., the Ekert protocol) the situation is somewhat different. While the possibility is mentioned by some authors, it is generally thought that an implementation of a (semi-)classical channel will differ significantly from that of a quantum channel. Here, a counterexample will be given using an identical physical setup as is used in photon-polarization Ekert QKD. Since the physical implementation is identical, a manufacturer may include this modification as a Trojan Horse in manufactured systems, to be activated at will by an eavesdropper. Thus, the old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device. Even when you do violate the Bell inequality.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Practical Trojan Horse for Bell-inequality-based Quantum Cryptography will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-632511

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.