DocumentCode :
3151155
Title :
Four Phase States Eavesdropping with no Quantum Interaction
Author :
Al-Attas, Abdulla Abdulqader ; Al-Khateeb, Wajdi ; Saharudin, Suhairi
Author_Institution :
Dept. of Comput. & Inf. Eng., Int. Islamic Univ., Kuala Lumpur
fYear :
2008
fDate :
26-28 Aug. 2008
Firstpage :
105
Lastpage :
109
Abstract :
Quantum mechanics is the pillar that holds the security of quantum key distribution and it has been proven that perfect security can be done with some non-ideal component. In this paper we experimentally demonstrate the Trojan horse attack, which is one of the possible methods of conventional optical eavesdropping. It eliminates the need of immediate interaction with transmitted quantum states. We will demonstrates method to distinguish between phase settings of Alice´s or Bob´s phase modulator, depending on parameters of the interrogating pulse and apparatus.
Keywords :
optical modulation; phase modulation; quantum cryptography; quantum optics; quantum theory; Trojan horse attack; four phase state eavesdropping; phase modulator; quantum interaction; quantum key distribution; quantum mechanics; Distributed computing; Information security; Invasive software; Mirrors; Optical computing; Optical interferometry; Optical reflection; Phase modulation; Quantum computing; Quantum mechanics; component; formatting; insert; style; styling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunication Technologies 2008 and 2008 2nd Malaysia Conference on Photonics. NCTT-MCP 2008. 6th National Conference on
Conference_Location :
Putrajaya
Print_ISBN :
978-1-4244-2214-2
Electronic_ISBN :
978-1-4244-2215-9
Type :
conf
DOI :
10.1109/NCTT.2008.4814249
Filename :
4814249
Link To Document :
بازگشت