285 research outputs found

    Full-field implementation of a perfect eavesdropper on a quantum cryptography system

    Full text link
    Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.Comment: Revised after editorial and peer-review feedback. This version is published in Nat. Commun. 8 pages, 6 figures, 1 tabl

    Controlling passively-quenched single photon detectors by bright light

    Full text link
    Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system containing such detectors. In this regime, all single photon detectors in the receiver Bob are uniformly blinded by continuous illumination coming from the eavesdropper Eve. When Eve needs a certain detector in Bob to produce a click, she modifies polarization (or other parameter used to encode quantum states) of the light she sends to Bob such that the target detector stops receiving light while the other detector(s) continue to be illuminated. The target detector regains single photon sensitivity and, when Eve modifies the polarization again, produces a single click. Thus, Eve has full control of Bob and can do a successful intercept-resend attack. To check the feasibility of the attack, 3 different models of passively-quenched detectors have been tested. In the experiment, I have simulated the intensity diagrams the detectors would receive in a real quantum key distribution system under attack. Control parameters and side effects are considered. It appears that the attack could be practically possible.Comment: Experimental results from a third detector model added. Minor corrections and edits made. 11 pages, 10 figure

    Affinity chromatography in dynamic combinatorial libraries: one-pot amplification and isolation of a strongly binding receptor

    Get PDF
    We report the one-pot amplification and isolation of a nanomolar receptor in a multibuilding block aqueous dynamic combinatorial library using a polymer-bound template. By appropriate choice of a poly(N,N-dimethylacrylamide)-based support, unselective ion-exchange type behaviour between the oppositely charged cationic guest and polyanionic hosts was overcome, such that the selective molecular recognition arising in aqueous solution reactions is manifest also in the analogous templated solid phase DCL syntheses. The ability of a polymer bound template to identify and isolate a synthetic receptor via dynamic combinatorial chemistry was not compromised by the large size of the library, consisting of well over 140 theoretical members, demonstrating the practical advantages of a polymer-supported DCL methodology

    Framework to Support the Process of Decision-Making on Life-Sustaining Treatments in the ICU: Results of a Delphi Study

    Get PDF
    Objectives: To develop a consensus framework that can guide the process of decision-making on continuing or limiting life-sustaining treatments in ICU patients, using evidence-based items, supported by caregivers, patients, and surrogate decision makers from multiple countries. Design: A three-round web-based international Delphi consensus study with a priori consensus definition was conducted with experts from 13 countries. Participants reviewed items of the decision-making process on a seven-point Likert scale or with open-ended questions. Questions concerned terminology, content, and timing of decision-making steps. The summarized results (including mean scores) and expert suggestions were presented in the subsequent round for review. Setting: Web-based surveys of international participants representing ICU physicians, nurses, former ICU patients, and surrogate decision makers. Patients: Not applicable. Interventions: Not applicable. Measurements and Main Results: In three rounds, respectively, 28, 28, and 27 (of 33 invited) physicians together with 12, 10, and seven (of 19 invited) nurses participated. Patients and surrogates were involved in round one and 12 of 27 responded. Caregivers were mostly working in university affiliated hospitals in Northern Europe. During the Delphi process, most items were modified in order to reach consensus. Seven items lacked consensus after three rounds. The final consensus framework comprises the content and timing of four elements; three elements focused on caregiver-surrogate communication (admission meeting, follow-up meeting, goals-of-care meeting); and one element (weekly time-out meeting) focused on assessing preferences, prognosis, and proportionality of ICU treatment among professionals. Conclusions: Physicians, nurses, patients, and surrogates generated a consensus-based framework to guide the process of decision-making on continuing or limiting life-sustaining treatments in the ICU. Early, frequent, and scheduled family meetings combined with a repeated multidisciplinary time-out meeting may support decisions in relation to patient preferences, prognosis, and proportionality

    Human factors and missed solutions to Enigma design weaknesses

    Get PDF
    The German World War II Enigma suffered from design weaknesses that facilitated its large-scale decryption by the British throughout the war. The author shows that the main technical weaknesses (self-coding and reciprocal coding) could have been avoided using simple contemporary technology, and therefore the true cause of the weaknesses is not technological but must be sought elsewhere. Specifically, human factors issues resulted in the persistent failure to seek out more effective designs. Similar limitations seem to beset the literature on the period, which misunderstands the Enigma weaknesses and therefore inhibits broader thinking about design or realising the critical role of human factors engineering in cryptography

    Environmental risk factors of type 2 diabetes-an exposome approach

    Get PDF
    Type 2 diabetes is one of the major chronic diseases accounting for a substantial proportion of disease burden in Western countries. The majority of the burden of type 2 diabetes is attributed to environmental risks and modifiable risk factors such as lifestyle. The environment we live in, and changes to it, can thus contribute substantially to the prevention of type 2 diabetes at a population level. The ‘exposome’ represents the (measurable) totality of environmental, i.e. nongenetic, drivers of health and disease. The external exposome comprises aspects of the built environment, the social environment, the physico-chemical environment and the lifestyle/food environment. The internal exposome comprises measurements at the epigenetic, transcript, proteome, microbiome or metabolome level to study either the exposures directly, the imprints these exposures leave in the biological system, the potential of the body to combat environmental insults and/or the biology itself. In this review, we describe the evidence for environmental risk factors of type 2 diabetes, focusing on both the general external exposome and imprints of this on the internal exposome. Studies provided established associations of air pollution, residential noise and area-level socioeconomic deprivation with an increased risk of type 2 diabetes, while neighbourhood walkability and green space are consistently associated with a reduced risk of type 2 diabetes. There is little or inconsistent evidence on the contribution of the food environment, other aspects of the social environment and outdoor temperature. These environmental factors are thought to affect type 2 diabetes risk mainly through mechanisms incorporating lifestyle factors such as physical activity or diet, the microbiome, inflammation or chronic stress. To further assess causality of these associations, future studies should focus on investigating the longitudinal effects of our environment (and changes to it) in relation to type 2 diabetes risk and whether these associations are explained by these proposed mechanisms. Graphical abstract: [Figure not available: see fulltext.

    Controlling a superconducting nanowire single-photon detector using tailored bright illumination

    Full text link
    We experimentally demonstrate that a superconducting nanowire single-photon detector is deterministically controllable by bright illumination. We found that bright light can temporarily make a large fraction of the nanowire length normally-conductive, can extend deadtime after a normal photon detection, and can cause a hotspot formation during the deadtime with a highly nonlinear sensitivity. In result, although based on different physics, the superconducting detector turns out to be controllable by virtually the same techniques as avalanche photodiode detectors. As demonstrated earlier, when such detectors are used in a quantum key distribution system, this allows an eavesdropper to launch a detector control attack to capture the full secret key without being revealed by to many errors in the key.Comment: Expanded discussions, updated references. 9 pages, 8 figure

    Wheat-barley hybridization – the last forty years

    Get PDF
    Abstract Several useful alien gene transfers have been reported from related species into wheat (Triticum aestivum), but very few publications have dealt with the development of wheat/barley (Hordeum vulgare) introgression lines. An overview is given here of wheat 9 barley hybridization over the last forty years, including the development of wheat 9 barley hybrids, and of addition and translocation lines with various barley cultivars. A short summary is also given of the wheat 9 barley hybrids produced with other Hordeum species. The meiotic pairing behaviour of wheat 9 barley hybrids is presented, with special regard to the detection of wheat– barley homoeologous pairing using the molecular cytogenetic technique GISH. The effect of in vitro multiplication on the genome composition of intergeneric hybrids is discussed, and the production and characterization of the latest wheat/barley translocation lines are presented. An overview of the agronomical traits (b-glucan content, earliness, salt tolerance, sprouting resistance, etc.) of the newly developed introgression lines is given. The exploitation and possible use of wheat/barley introgression lines for the most up-to-date molecular genetic studies (transcriptome analysis, sequencing of flow-sorted chromosomes) are also discussed
    corecore