Quantum Key Distribution - interception confusion

In summary, Alice and Bob are using entangled photons for communication. However, Eve intercepts the photon meant for Bob and measures it, preparing another photon with the same state to send to Bob. This poses a risk of Eve being detected if Alice and Bob use different polarizations for detection.
  • #1
JaneHall89
19
0
I'm battled by my thought of interception.

The entangled photon between Alice and Bob, suppose the one at Alice's side is already measured to be 1, so the second is heading over to Bob to be 0. Eve gets to it first and measures it to be 0.

Knowing its 0, eve prepares a photon of state 0 and sends it to Bob.

Both Alice and Bob are oblivious to the interception. What am I missing ?
 
Physics news on Phys.org

Related to Quantum Key Distribution - interception confusion

1. What is quantum key distribution (QKD)?

Quantum key distribution (QKD) is a method of securely sharing cryptographic keys between two parties using principles of quantum mechanics. It allows for the distribution of keys that are provably secure against interception or eavesdropping attempts.

2. How does QKD prevent interception or eavesdropping?

QKD uses the principles of quantum mechanics to ensure the security of the keys being shared. In quantum mechanics, any attempt to observe or measure a particle's state will alter it, making it impossible for an eavesdropper to intercept the key without being detected.

3. What is "interception confusion" in QKD?

"Interception confusion" refers to the attempt by an eavesdropper to intercept the quantum signals being shared between the two parties in order to obtain the secret key. However, due to the principles of quantum mechanics, any interception attempt will result in the key being altered and the eavesdropper being detected.

4. Is QKD a reliable method for secure communication?

Yes, QKD is considered to be a highly reliable method for secure communication. It has been extensively studied and has been proven to be secure against all known eavesdropping techniques. However, like any technology, it is not completely infallible and may have vulnerabilities that have yet to be discovered.

5. What are the potential applications of QKD?

QKD has potential applications in various areas such as secure communication for government and military organizations, banking and financial institutions, and other industries that require highly secure communication. It can also be used for secure data transmission in cloud computing and the Internet of Things (IoT).

Similar threads

Replies
7
Views
764
  • Quantum Physics
Replies
4
Views
654
  • Quantum Physics
Replies
16
Views
2K
Replies
3
Views
983
Replies
99
Views
3K
Replies
41
Views
2K
Replies
16
Views
1K
Replies
5
Views
1K
Replies
6
Views
1K
  • Quantum Physics
Replies
6
Views
1K
Back
Top