What is the role of Eve in a Man in the Middle attack?

  • Context: Graduate 
  • Thread starter Thread starter Nur Ziadah
  • Start date Start date
  • Tags Tags
    cryptography
Click For Summary
SUMMARY

The discussion centers on the role of Eve in a Man in the Middle (MIM) attack within quantum communication. It highlights that Eve can extract a mean photon number of (1-t2)N from Alice's transmission and t(1-t2)N from Bob's reception. This extraction occurs because Eve must send t2N to Alice to maintain the illusion of a secure connection. The references provided point to the paper available at arxiv.org for further details.

PREREQUISITES
  • Understanding of quantum communication principles
  • Familiarity with Man in the Middle (MIM) attack mechanics
  • Knowledge of photon transmission and mean photon number concepts
  • Basic grasp of quantum channel transmittance (t)
NEXT STEPS
  • Study the mathematical derivation of photon number extraction in quantum MIM attacks
  • Research quantum key distribution protocols to understand defense mechanisms against MIM attacks
  • Examine the implications of quantum channel transmittance on secure communications
  • Review the referenced paper on quantum MIM attacks for deeper insights
USEFUL FOR

Quantum communication researchers, cybersecurity professionals, and anyone interested in understanding the vulnerabilities of quantum key distribution systems.

Nur Ziadah
Messages
34
Reaction score
3
I have some curiosity about MIM attack in a paper that I have been found before. The diagram shows the MIM attack between Alice and Bob:
upload_2018-12-20_16-20-26.png


I found that the sentences state:

"We consider that the transmittance of the quantum channel is t. If Alice sends pulses with a mean photon number of N, Bob expects to receive pulses with mean photon number tN in the first stage and t3N in the third stage, and Alice expects to receive pulses with mean photon number t2N in the second stage. Therefore, for the MIM attack, Eve can extract a mean photon number of (1-t2)N to obtain the estimate
φ1 and a mean photon number of t(1-t2)N to obtain the estimate θB .
"

Question
How to derived (1-t2)N and t(1-t2)N?

Thank you.
 

Attachments

  • upload_2018-12-20_16-20-26.png
    upload_2018-12-20_16-20-26.png
    4.6 KB · Views: 906
  • upload_2018-12-20_16-22-56.png
    upload_2018-12-20_16-22-56.png
    4.6 KB · Views: 381
Physics news on Phys.org
Please give the reference where this is taken from.
 
I assume that they consider that Eve will receive the full signal from Alice, so a mean number of photons of N, and since she needs to send t2N to Alice so she doesn't suspect the MIM attack, Eve can use at most (1-t2)N of those photons for her spying purposes. Likewise with her spying of Bob.
 
DrClaude said:
I assume that they consider that Eve will receive the full signal from Alice, so a mean number of photons of N, and since she needs to send t2N to Alice so she doesn't suspect the MIM attack, Eve can use at most (1-t2)N of those photons for her spying purposes. Likewise with her spying of Bob.
DrClaude, it can be assumed that Eve is trying to intercept the communication at the first stage using (1-t2)N, isn't it?
 
Nur Ziadah said:
DrClaude, it can be assumed that Eve is trying to intercept the communication at the first stage using (1-t2)N, isn't it?
Disclaimer: I haven't read the article in detail. Eve is trying to intercept the communication by stopping all direct communication between Alice and Bob, replacing it by independent exchanges between Alice on one side and Bob on the other.
 

Similar threads

  • · Replies 16 ·
Replies
16
Views
3K
  • · Replies 1 ·
Replies
1
Views
5K
Replies
4
Views
5K
  • · Replies 29 ·
Replies
29
Views
2K
  • · Replies 13 ·
Replies
13
Views
5K
  • · Replies 67 ·
3
Replies
67
Views
16K
  • · Replies 2 ·
Replies
2
Views
2K
  • · Replies 128 ·
5
Replies
128
Views
34K
  • · Replies 1 ·
Replies
1
Views
4K
  • · Replies 13 ·
Replies
13
Views
3K