Eavesdropping on practical quantum cryptography

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

to appear in J. Mod. Opt

Scientific paper

Practical implementations of quantum cryptography use attenuated laser pulses as the signal source rather than single photons. The channels used to transmit are also lossy. Here we give a simple derivation of two beam-splitting attacks on quantum cryptographic systems using laser pulses, either coherent or mixed states with any mean photon number. We also give a simple derivation of a photon-number splitting attack, the most advanced, both in terms of performance and technology required. We find bounds on the maximum disturbance for a given mean photon number and observed channel transmission efficiency for which a secret key can be distilled. We start by reviewing two incoherent attacks that can be used on single photon quantum cryptographic systems. These results are then adapted to systems that use laser pulses and lossy channels.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Eavesdropping on practical quantum cryptography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Eavesdropping on practical quantum cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Eavesdropping on practical quantum cryptography will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-79859

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.