conference logo

Playlist "26C3: Here be Dragons"

How you can build an eavesdropper for a quantum cryptosystem

Qin Liu and Sebastien Sauge

This presentation will show the first experimental implementation of an eavesdropper for quantum cryptosystem. Although quantum cryptography has been proven unconditionally secure, by exploiting physical imperfections (detector vulnerability) we have successfully built an intercept-resend attack and demonstrated eavesdropping under realistic conditions on an installed quantum key distribution line. The actual eavesdropping hardware we have built will be shown during the conference.