228 research outputs found

    On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

    Full text link
    It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills Luetkenhaus bound, independently of whether error positions are leaked to Eve, proving that it is tight. In addition, we clarify why the existence of such optimal attacks is not in contradiction with the established ``old-style'' theory of BB84 individual attacks, as incorrectly suggested recently in a news feature.Comment: 12 pages, 3 figure

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Vanishing Integral Relations and Expectation Values for Bloch Functions in Finite Domains

    Full text link
    Integral identities for particular Bloch functions in finite periodic systems are derived. All following statements are proven for a finite domain consisting of an integer number of unit cells. It is shown that matrix elements of particular Bloch functions with respect to periodic differential operators vanish identically. The real valuedness, the time-independence and a summation property of the expectation values of periodic differential operators applied to superpositions of specific Bloch functions are derived.Comment: 10 page

    A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

    Full text link
    In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks. We further propose a modified authentication algorithm which features higher efficiency with respect to consumption of mutual secret bits.Comment: 4 pages, submitted to the International Journal of Quantum Information, Proceedings of the meeting "Foundations of Quantum Information", Camerino, April 200

    Vestibular effects of diving

    Get PDF
    Over the last 45 years, recreational self-contained underwater breathing apparatus (SCUBA) diving as a leisure activity has increased in popularity. According to the Professional Association of Diving Instructors (PADI), more than 23 million diver certificates have been issued across the globe. Given the popularity of scuba diving, it is incumbent on every physician to know and understand the specific medical hazards and conditions associated with scuba diving. Although diving has become more accessible and the equipment is much safer now, diving still has its inherent dangers. Each year incidents occur, ranging from seasickness and sinus problems to heart conditions and mortality. More than 80% of all diving complications occur in the head and neck region. A number of studies have found that diving can lead to the development of vestibular disorders such as: Barotrauma, Decompression sickness, Otitis externa, Bilateral exostoses, Chronic sinusitis (barosinusitis), Serous tubotympanic catarrh, Tinnitus, Dizziness, Vertigo.The aim of this paper was to share our experience in the field of treating patients with different types of ENT disorders after or before a diving session. We briefly summarized the most important information for some of the disorders.We included in our study for a period of 12 years: a total of 24 patients (four females and 20 males), who dive. They were between 25 and 55 years of age. Some presented in clinics with an ENT disorder. 19 were professional, qualified divers, five (three males and two females) dove for the first time. On all 24 patients we performed: audiometry tests, Tympanometry tests, OAE, Static and dynamic vestibular tests, vHIT – in the last five years, otoscopy examination, dental check-ups.All divers – no matter professionalists or not – should follow these recommendations: a thorough prophylactic ENT check-up should be performed before an active diving session. Chronic ENT inflammations should be addressed in a timely manner. Divers should follow all instructions from the certified Diving Associations

    New intensity and visibility aspects of a double loop neutron interferometer

    Full text link
    Various phase shifters and absorbers can be put into the arms of a double loop neutron interferometer. The mean intensity levels of the forward and diffracted beams behind an empty four plate interferometer of this type have been calculated. It is shown that the intensities in the forward and diffracted direction can be made equal using certain absorbers. In this case the interferometer can be regarded as a 50/50 beam splitter. Furthermore the visibilities of single and double loop interferometers are compared to each other by varying the transmission in the first loop using different absorbers. It can be shown that the visibility becomes exactly 1 using a phase shifter in the second loop. In this case the phase shifter in the second loop must be strongly correlated to the transmission coefficient of the absorber in the first loop. Using such a device homodyne-like measurements of very weak signals should become possible.Comment: 12 pages, 9 figures, accepted for publication in the Journal of Optics B - Quantum and Semiclassical Optic

    Outline of the SECOQC Quantum-Key-Distribution Network in Vienna

    Full text link
    A Quantum Key Distribution (QKD) network is currently implemented in Vienna by integrating seven QKD-Link devices that connect five subsidiaries of SIEMENS Austria. We give an architectural overview of the network and present the enabling QKD-technologies, as well as the novel QKD network protocols.Comment: 10 pages, 5 figure

    Soluble Urokinase Receptor and the Kidney Response in Diabetes Mellitus

    Get PDF
    Diabetic nephropathy (DN) is the leading cause of end-stage renal disease (ESRD) worldwide. DN typically manifests by glomerular hyperfiltration and microalbuminuria; then, the disease progresses to impaired glomerular filtration rate, which leads to ESRD. Treatment options for DN include the strict control of blood glucose levels and pressure (e.g., intraglomerular hypertension). However, the search for novel therapeutic strategies is ongoing. These include seeking specific molecules that contribute to the development and progression of DN to potentially interfere with these “molecular targets” as well as with the cellular targets within the kidney such as podocytes, which play a major role in the pathogenesis of DN. Recently, podocyte membrane protein urokinase receptor (uPAR) and its circulating form (suPAR) are found to be significantly induced in glomeruli and sera of DN patients, respectively, and elevated suPAR levels predicted diabetic kidney disease years before the occurrence of microalbuminuria. The intent of this review is to summarize the emerging evidence of uPAR and suPAR in the clinical manifestations of DN. The identification of specific pathways that govern DN will help us build a more comprehensive molecular model for the pathogenesis of the disease that can inform new opportunities for treatment

    Practical Quantum Key Distribution with Polarization-Entangled Photons

    Full text link
    We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware devices, which were connected by 1.45 km of optical fiber, installed for this experiment in the Vienna sewage system. The generated quantum key was immediately handed over and used by a secure communication application.Comment: 5 pages, 3 figure
    corecore