Nugatory said:
Alice and Bob use entanglement to create an encryption key that is known only to them. Once they have that key, they use ordinary symmetric-key encryption to send their message through the regular channel. Eve, the eavesdropper, can tap the regular channel, but without the key she cannot get any information from it.
They would be able to shut the key-generation system down, but that's all. They would not be able to manipulate it in such a way that they could learn the keys that Alice and Bob are generating.
Thank you. But i still don't understand it fully.
So basic 1 : quantum information can't be cloned, any measurement change it, and we can't get all information in a single measurement
basic 2 : in case of entanglement tampering with one side means the other side instantly (or at least faster than light, unknown max distance) reacts, but next point
basic 3 : no matter how great it sounds, we CANT use it for signaling, since coherence is destroyed instantly, and before measurement we can't be even sure whether it in is state A or B, so it means nothing if we find 2 particles in state A and 3 in state B
I hope i managed to get the basics right.
So how eavesdropping is detected, how do we know, that a spy tampered with the particles, and not our measurement broke the coherence? The information is changed, but doesn't entanglement means it changed on both side?
Is it because info teleportation, that we add info C to an entangled pair, and it appears on the other side if coherence still stands? And even if the other side don't know, that whether the result is A+C or B+C or A+D (still no signaling useful data) we can count on that both sides have the same key?
What about noisy quantum key distribution channel? That could destroy coherence too, so redundancy is needed, is there a clear difference between tapping and simple noise?
(Quantum key distribution is vulnerable to a man-in-the-middle attack, but this attack requires control of the classical channel)
What does exactly vulnerable means in this case, and what the attacker could achieve?