We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy ...We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.展开更多
We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The...We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The Doppler broad- ening effect is also noted on the propagation of the birefringent pulses. The dispersions of the birefringence beams are oppositely manipulated for delay and advancement of time at a Doppler width of 10Y. A time gap is created between the birefringence beams, which protects from hacking of information. The time gap is then closed to restore the pulse into the original form by a reverse manipulation of the dispersion of the birefringence beams, i.e., introducing another medium whose transfer function is the complex conjugate of that of the original medium. The results are useful for secure communication technology.展开更多
There is always need for secure transmission of information and simultaneously compact-size photonic circuits. This can be achieved if surface plasmon-polaritons(SPPs) are used as source of information, and the reduce...There is always need for secure transmission of information and simultaneously compact-size photonic circuits. This can be achieved if surface plasmon-polaritons(SPPs) are used as source of information, and the reduced hacking as the transmission phenomenon. In this article, an SPP-based reduced hacking scheme is presented at interface between atomic medium and metallic conductor. The SPP propagation is manipulated with conductivity of the metal. The delay or advance of the SPP is found to create nanosecond time gap which can be used for storing and sending the information safely. The reduced hacking is further modified with conductivity of the metal and the control parameters of the atomic medium.展开更多
Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</sp...Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</span><span style="font-family:Verdana;"> computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes;2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking;and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.展开更多
基金supported by the National Basic Research Program of China(Grant No.2013CB338002)the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261)
文摘We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.
文摘We propose a new scheme for the coherent control of birefringent light pulses propagation in a four-level atomic medium. We modify the splitting of a light pulse by controlling the electric and magnetic responses. The Doppler broad- ening effect is also noted on the propagation of the birefringent pulses. The dispersions of the birefringence beams are oppositely manipulated for delay and advancement of time at a Doppler width of 10Y. A time gap is created between the birefringence beams, which protects from hacking of information. The time gap is then closed to restore the pulse into the original form by a reverse manipulation of the dispersion of the birefringence beams, i.e., introducing another medium whose transfer function is the complex conjugate of that of the original medium. The results are useful for secure communication technology.
文摘There is always need for secure transmission of information and simultaneously compact-size photonic circuits. This can be achieved if surface plasmon-polaritons(SPPs) are used as source of information, and the reduced hacking as the transmission phenomenon. In this article, an SPP-based reduced hacking scheme is presented at interface between atomic medium and metallic conductor. The SPP propagation is manipulated with conductivity of the metal. The delay or advance of the SPP is found to create nanosecond time gap which can be used for storing and sending the information safely. The reduced hacking is further modified with conductivity of the metal and the control parameters of the atomic medium.
文摘Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</span><span style="font-family:Verdana;"> computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes;2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking;and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.