55 research outputs found

    Blurring the Boundaries: Reflecting on PDS Roles and Responsibilities through Multiple Lenses

    Get PDF
    It is well documented that successful Professional Development School (PDS) initiatives are contingent on trusting relationships between the university and school districts

    Spatial Mode Side Channels in Free-Space QKD Implementations

    Get PDF

    Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors

    Full text link
    The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper can utilize technical imperfections of the actual implementation. Here we describe and experimentally demonstrate a very simple but highly effective attack which even does not need to intercept the quantum channel at all. Only by exploiting the dead time effect of single photon detectors the eavesdropper is able to gain (asymptotically) full information about the generated keys without being detected by state-of-the-art QKD protocols. In our experiment, the eavesdropper inferred up to 98.8% of the key correctly, without increasing the bit error rate between Alice and Bob significantly. Yet, we find an evenly simple and effective countermeasure to inhibit this and similar attacks

    Full-field implementation of a perfect eavesdropper on a quantum cryptography system

    Full text link
    Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.Comment: Revised after editorial and peer-review feedback. This version is published in Nat. Commun. 8 pages, 6 figures, 1 tabl

    Hacking commercial quantum cryptography systems by tailored bright illumination

    Full text link
    The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built of off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.Comment: Revised version, rewritten for clarity. 5 pages, 5 figures. To download the Supplementary information (which is in open access), go to the journal web site at http://dx.doi.org/10.1038/nphoton.2010.21

    Heterogeneity assessment of functional T cell avidity.

    Get PDF
    The potency of cellular immune responses strongly depends on T cell avidity to antigen. Yet, functional avidity measurements are rarely performed in patients, mainly due to the technical challenges of characterizing heterogeneous T cells. The mean functional T cell avidity can be determined by the IFN-γ Elispot assay, with titrated amounts of peptide. Using this assay, we developed a method revealing the heterogeneity of functional avidity, represented by the steepness/hillslope of the peptide titration curve, documented by proof of principle experiments and mathematical modeling. Our data show that not only natural polyclonal CD8 T cell populations from cancer patients, but also monoclonal T cells differ strongly in their heterogeneity of functional avidity. Interestingly, clones and polyclonal cells displayed comparable ranges of heterogeneity. We conclude that besides the mean functional avidity, it is feasible and useful to determine its heterogeneity (hillslope) for characterizing T cell responses in basic research and patient investigation

    Quantum key distribution using quantum dot single-photon emitting diodes in the red and near infrared spectral range

    Get PDF
    We report on in-lab free space quantum key distribution (QKD) experiments over 40 cm distance using highly efficient electrically driven quantum dot single-photon sources emitting in the red as well as near-infrared spectral range. In the case of infrared emitting devices, we achieve sifted key rates of 27.2 kbit s(-1)(35.4 kbit s(-1)) at a quantum bit error rate (QBER) of 3.9% (3.8%) and a g((2))(0) value of 0.35 (0.49) at moderate (high) excitation. The red emitting diodes generate sifted keys at a rate of 95.0 kbit s(-1) at a QBER of 4.1% and a g((2))(0) value of 0.49. This first successful proof of principle QKD experiment based on electrically operated semiconductor single-photon sources can be considered as a major step toward practical and efficient quantum cryptography scenarios.Publisher PDFPeer reviewe
    corecore