4 research outputs found

    A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

    Full text link
    In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.Comment: 4 pages, submitted to the International Journal of Quantum Information, Proceedings of the meeting "Foundations of Quantum Information", Camerino, April 200

    Practical Quantum Key Distribution with Polarization-Entangled Photons

    Full text link
    We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed over and used by a secure communication application.Comment: 5 pages, 3 figure
    corecore