International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 03 August 2013

Zhengjun Cao
ePrint Report ePrint Report
What is the behavior of an adversary to launch attacks against a communication? The good choice is to eavesdrop the communication such that the communicators can not detect the eavesdropping. The general choice is to disrupt the communication at low cost, say, measuring the transferred quantum signals in the well-known BB84 quantum key distribution protocol. The bad choice is to disrupt it at even high cost, such as severing copper or fiber, if it is necessary. In this note we remark that a quantum communication is very vulnerable to low cost attacks. The plan to build a large quantum photonic network is infeasible.

Expand

Additional news items may be found on the IACR news page.