96 research outputs found

    A single-crystal source of path-polarization entangled photons at non-degenerate wavelengths

    Full text link
    We demonstrate a bright, narrowband, compact, quasi-phase-matched single-crystal source generating path-polarization-entangled photon pairs at 810 nm and 1550 nm at a maximum rate of 3 Mcounts/(s THz mW) after coupling to single-mode fiber, and with two-photon interference visibility above 90%. While the source can already be used to implement quantum communication protocols such as quantum key distribution, this work is also instrumental for narrowband applications such as entanglement transfer from photonic to atomic qubits, or entanglement of photons from independent sources.Comment: 7 pages, 3 figures, published in Optics Express (2008

    Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors

    Full text link
    The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper can utilize technical imperfections of the actual implementation. Here we describe and experimentally demonstrate a very simple but highly effective attack which even does not need to intercept the quantum channel at all. Only by exploiting the dead time effect of single photon detectors the eavesdropper is able to gain (asymptotically) full information about the generated keys without being detected by state-of-the-art QKD protocols. In our experiment, the eavesdropper inferred up to 98.8% of the key correctly, without increasing the bit error rate between Alice and Bob significantly. Yet, we find an evenly simple and effective countermeasure to inhibit this and similar attacks

    Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Full text link
    Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we experimentally demonstrate a technically feasible "intercept-and-resend" attack that exploits such a security loophole in a commercial "plug & play" QKD system. The resulting quantum bit error rate is 19.7%, which is below the proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314, 2007) proposed by our group.Comment: 16 pages, 6 figure

    Controlling passively-quenched single photon detectors by bright light

    Full text link
    Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system containing such detectors. In this regime, all single photon detectors in the receiver Bob are uniformly blinded by continuous illumination coming from the eavesdropper Eve. When Eve needs a certain detector in Bob to produce a click, she modifies polarization (or other parameter used to encode quantum states) of the light she sends to Bob such that the target detector stops receiving light while the other detector(s) continue to be illuminated. The target detector regains single photon sensitivity and, when Eve modifies the polarization again, produces a single click. Thus, Eve has full control of Bob and can do a successful intercept-resend attack. To check the feasibility of the attack, 3 different models of passively-quenched detectors have been tested. In the experiment, I have simulated the intensity diagrams the detectors would receive in a real quantum key distribution system under attack. Control parameters and side effects are considered. It appears that the attack could be practically possible.Comment: Experimental results from a third detector model added. Minor corrections and edits made. 11 pages, 10 figure

    Discovery of the Binary Pulsar PSR B1259-63 in Very-High-Energy Gamma Rays around Periastron with H.E.S.S

    Get PDF
    We report the discovery of very-high-energy (VHE) gamma-ray emission of the binary system PSR B1259-63/SS 2883 of a radio pulsar orbiting a massive, luminous Be star in a highly eccentric orbit. The observations around the 2004 periastron passage of the pulsar were performed with the four 13 m Cherenkov telescopes of the H.E.S.S. experiment, recently installed in Namibia and in full operation since December 2003. Between February and June 2004, a gamma-ray signal from the binary system was detected with a total significance above 13 sigma. The flux was found to vary significantly on timescales of days which makes PSR B1259-63 the first variable galactic source of VHE gamma-rays observed so far. Strong emission signals were observed in pre- and post-periastron phases with a flux minimum around periastron, followed by a gradual flux decrease in the months after. The measured time-averaged energy spectrum above a mean threshold energy of 380 GeV can be fitted by a simple power law F_0(E/1 TeV)^-Gamma with a photon index Gamma = 2.7+-0.2_stat+-0.2_sys and flux normalisation F_0 = (1.3+-0.1_stat+-0.3_sys) 10^-12 TeV^-1 cm^-2 s^-1. This detection of VHE gamma-rays provides unambiguous evidence for particle acceleration to multi-TeV energies in the binary system. In combination with coeval observations of the X-ray synchrotron emission by the RXTE and INTEGRAL instruments, and assuming the VHE gamma-ray emission to be produced by the inverse Compton mechanism, the magnetic field strength can be directly estimated to be of the order of 1 G.Comment: 10 pages, 8 figures, accepted in Astronomy and Astrophysics on 2 June 2005, replace: document unchanged, replaced author field in astro-ph entry - authors are all members of the H.E.S.S. collaboration and three additional authors (99+3, see document

    Information theoretic security by the laws of classical physics

    Full text link
    It has been shown recently that the use of two pairs of resistors with enhanced Johnson-noise and a Kirchhoff-loop-i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol-for secure key distribution leads to information theoretic security levels superior to those of a quantum key distribution, including a natural immunity against a man-in-the-middle attack. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. This presentation first briefly surveys the KLJN system and then discusses related, essential questions such as: what are perfect and imperfect security characteristics of key distribution, and how can these two types of securities be unconditional (or information theoretical)? Finally the presentation contains a live demonstration.Comment: Featured in MIT Technology Review http://www.technologyreview.com/view/428202/quantum-cryptography-outperformed-by-classical/ ; Plenary talk at the 5th IEEE Workshop on Soft Computing Applications, August 22-24, 2012, (SOFA 2012). Typos correcte

    Heavy Metal Tolerance in Stenotrophomonas maltophilia

    Get PDF
    Stenotrophomonas maltophilia is an aerobic, non-fermentative Gram-negative bacterium widespread in the environment. S. maltophilia Sm777 exhibits innate resistance to multiple antimicrobial agents. Furthermore, this bacterium tolerates high levels (0.1 to 50 mM) of various toxic metals, such as Cd, Pb, Co, Zn, Hg, Ag, selenite, tellurite and uranyl. S. maltophilia Sm777 was able to grow in the presence of 50 mM selenite and 25 mM tellurite and to reduce them to elemental selenium (Se0) and tellurium (Te0) respectively. Transmission electron microscopy and energy dispersive X-ray analysis showed cytoplasmic nanometer-sized electron-dense Se0 granules and Te0 crystals. Moreover, this bacterium can withstand up to 2 mM CdCl2 and accumulate this metal up to 4% of its biomass. The analysis of soluble thiols in response to ten different metals showed eightfold increase of the intracellular pool of cysteine only in response to cadmium. Measurements by Cd K-edge EXAFS spectroscopy indicated the formation of Cd-S clusters in strain Sm777. Cysteine is likely to be involved in Cd tolerance and in CdS-clusters formation. Our data suggest that besides high tolerance to antibiotics by efflux mechanisms, S. maltophilia Sm777 has developed at least two different mechanisms to overcome metal toxicity, reduction of oxyanions to non-toxic elemental ions and detoxification of Cd into CdS

    Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme

    Get PDF
    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law–Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.Laszlo B. Kish, Derek Abbott, Claes G. Granqvis
    • …
    corecore