What is the role of Eve in a Man in the Middle attack?

  • Thread starter Thread starter Nur Ziadah
  • Start date Start date
  • Tags Tags
    cryptography
Nur Ziadah
Messages
34
Reaction score
3
I have some curiosity about MIM attack in a paper that I have been found before. The diagram shows the MIM attack between Alice and Bob:
upload_2018-12-20_16-20-26.png


I found that the sentences state:

"We consider that the transmittance of the quantum channel is t. If Alice sends pulses with a mean photon number of N, Bob expects to receive pulses with mean photon number tN in the first stage and t3N in the third stage, and Alice expects to receive pulses with mean photon number t2N in the second stage. Therefore, for the MIM attack, Eve can extract a mean photon number of (1-t2)N to obtain the estimate
φ1 and a mean photon number of t(1-t2)N to obtain the estimate θB .
"

Question
How to derived (1-t2)N and t(1-t2)N?

Thank you.
 

Attachments

  • upload_2018-12-20_16-20-26.png
    upload_2018-12-20_16-20-26.png
    4.6 KB · Views: 865
  • upload_2018-12-20_16-22-56.png
    upload_2018-12-20_16-22-56.png
    4.6 KB · Views: 364
Physics news on Phys.org
Please give the reference where this is taken from.
 
  • Like
Likes AndrewGRQTF, Nur Ziadah and DrClaude
I assume that they consider that Eve will receive the full signal from Alice, so a mean number of photons of N, and since she needs to send t2N to Alice so she doesn't suspect the MIM attack, Eve can use at most (1-t2)N of those photons for her spying purposes. Likewise with her spying of Bob.
 
DrClaude said:
I assume that they consider that Eve will receive the full signal from Alice, so a mean number of photons of N, and since she needs to send t2N to Alice so she doesn't suspect the MIM attack, Eve can use at most (1-t2)N of those photons for her spying purposes. Likewise with her spying of Bob.
DrClaude, it can be assumed that Eve is trying to intercept the communication at the first stage using (1-t2)N, isn't it?
 
Nur Ziadah said:
DrClaude, it can be assumed that Eve is trying to intercept the communication at the first stage using (1-t2)N, isn't it?
Disclaimer: I haven't read the article in detail. Eve is trying to intercept the communication by stopping all direct communication between Alice and Bob, replacing it by independent exchanges between Alice on one side and Bob on the other.
 
Back
Top