Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Similar documents
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Security Implications of Quantum Technologies

10 - February, 2010 Jordan Myronuk

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Entanglement and information

Technical Report Communicating Secret Information Without Secret Messages

Quantum Cryptography

arxiv:quant-ph/ v2 2 Jan 2007

EPR paradox, Bell inequality, etc.

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

1 1D Schrödinger equation: Particle in an infinite box

Teleporting an Unknown Quantum State Via Dual Classical and Einstein Podolsky Rosen Channels 1

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Problem Set: TT Quantum Information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Cryptography and Security of Information Systems

arxiv:quant-ph/ v2 3 Oct 2000

Quantum Cryptography

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

1 1D Schrödinger equation: Particle in an infinite box

A probabilistic quantum key transfer protocol

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

arxiv:quant-ph/ v2 11 Jan 2006

LECTURE NOTES ON Quantum Cryptography

Experimental realization of quantum cryptography communication in free space

Research, Development and Simulation of Quantum Cryptographic Protocols

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Bell inequality for qunits with binary measurements

Testing Heisenberg s Uncertainty Principle with Polarized Single Photons

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

arxiv:quant-ph/ v1 6 Dec 2005

Quantum Teleportation with Photons. Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997).

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

quantum distribution of a sudoku key Sian K. Jones University of South Wales

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 13 Jan 2003

A Superluminal communication solution based on Four-photon entanglement

Take that, Bell s Inequality!

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Cryptography. Marshall Roth March 9, 2007

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:

Ping Pong Protocol & Auto-compensation

Ground-Satellite QKD Through Free Space. Steven Taylor

Entanglement and Quantum Teleportation

Deterministic secure communications using two-mode squeezed states

Bell s inequalities and their uses

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

arxiv:quant-ph/ v1 21 Apr 2004

Entanglement and Bell s Inequalities Edward Pei. Abstract

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

Security and implementation of differential phase shift quantum key distribution systems

arxiv:quant-ph/ v2 25 May 2005

A PRACTICAL TROJAN HORSE FOR BELL-INEQUALITY- BASED QUANTUM CRYPTOGRAPHY

Perfectly secure cipher system.

Title Experimental long-distance quantum secure direct communication

Introduction to Quantum Key Distribution

Quantum Teleportation

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Entanglement Assisted Key Distribution

arxiv:quant-ph/ v1 10 Apr 2006

Quantum Entanglement and Bell s Inequalities Zachary Evans, Joel Howard, Jahnavi Iyer, Ava Dong, and Maggie Han

arxiv:quant-ph/ v1 13 Mar 2007

Quantum Cryptography Bertrand Bonnefoy-Claudet Zachary Estrada

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

PHY3902 PHY3904. Photon Entanglement. Laboratory protocol

arxiv:quant-ph/ v2 17 Mar 2003

arxiv:quant-ph/ v1 2 Oct 1997

arxiv: v2 [quant-ph] 9 Nov 2011

Lecture: Quantum Information

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

INTRODUCTION TO QUANTUM COMPUTING

Quantum Cryptography: A Short Historical overview and Recent Developments

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Security of Quantum Key Distribution with Imperfect Devices

Quantum Entanglement and Bell's Inequalities

Single Wavelength Entangled Pair in Quantum Channel Authentication for QKD

Experiment 6 - Tests of Bell s Inequality

Laboratory 1: Entanglement & Bell s Inequalities

A Matlab Realization of Shor s Quantum Factoring Algorithm

Quantum Communication. Serge Massar Université Libre de Bruxelles

Chapter 2. A Look Back. 2.1 Substitution ciphers

Quantum key distribution with 2-bit quantum codes

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

On Free Space Quantum Key Distribution and its Implementation with a Polarization-Entangled Parametric Down Conversion Source.

Calculation of the Key Length for Quantum Key Distribution

arxiv: v1 [quant-ph] 3 Jul 2018

Secrecy and the Quantum

Transcription:

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum Optics Department of Physics Stockholm University Research Academy for Young Scientists July 6, 2011

Abstract Quantum key distribution claims to be an unconditionally secure way of communication. In this paper we investigate the possibility of eavesdropping upon a quantum key distribution using the BB84 protocol by the intercept-resend method. To determine if an eavesdropper was present, both the Bell inequality and the error rate was calculated. Without any eavesdropper present the Bell value was determined to S = 2.62 ± 0.08 and the error rate to 4.4%. With the eavesdropper present the Bell value was determined to S = 1.40 ± 0.07 and the error rate to 31%. This data strongly indicates that an eavesdropper using this method of attack will be detected. 2

1 Introduction People have always wanted to keep some information hidden or secret from each other. To prevent eavesdropping in communication of such secret information different means of encryption have been invented. The security of all modern communication rests on the assumptions that the eavesdropper does not have the knowledge or technology required to break the encryption within a time span that makes the effort profitable. As technology advances it becomes an easier task to break classical means of encryption. Quantum cryptography rests on none of these assumptions and promises the two communicating parties total and unconditional privacy, no matter how technologically advanced or well-funded the eavesdropper might be. The purpose of this paper is to investigate the possibility of eavesdropping upon a quantum channel by using the intercept-resend method without being detected. 2 Theory 2.1 Classical Cryptography Deriving from the Greek words κρυπτ ς and γραϕη meaning hidden and to write, cryptography is the art of making a message unintelligible without specific knowledge. There are many ways of encrypting a message to meet these ends and one can divide almost all ciphers into two distinct groups: substitution and transposition ciphers. In substitution cipher each letter is replaced by another determined by a pattern, based on the key. Transposition ciphers simply switch the order of the letters in the message in accordance with a predetermined pattern, also based on a key. The principle of all of them is that a sender, Alice, encrypts the plaintext with the help of a key. She then sends the ciphertext to the receiver, Bob, who also has the key, which he can use to decrypt the ciphertext into plaintext. All of this must be done with a key that is common between Alice and Bob, but secret to all other parties. Otherwise an eavesdropper, Eve, can gain full access to the information. In this report we will focus on one distinct form of encryption: the one-time pad. This is a symmetric substitution cipher were Alice and Bob shares a common key which is completely random, unique and as long as the plaintext. Because of these three properties all outcomes are equally probable. This means that the one-time pad offers complete and perfect secrecy [1]. The most efficient way of creating a cipher for a binary code is by a method called the XOR cipher. Basically it can be described with four simple steps: 1. Alice has a plaintext, for example 01001100 01110011, and a key, 00110111 01111000. 2. By putting the plaintext and the key as two rows under each other and adding the columns together: 0 and 2 both make 0, while 1 makes 1. Thus 0+0 and 1+1 both equal 0, while 0+1 and 1+0 equal 1. Thereby the ciphertext, 01111011 00001011, is generated. 3. Alice then sends the ciphertext to Bob through a classical channel. 4. Bob uses the key that he shares with Alice to reverse the procedure done by Alice. This is possible by putting the ciphertext above the key and repeating the process done in step 2. The encryption process is simply addition of the columns modulo 2. The strength of this encryption is that there is no way for an eavesdropper to know if there is a 0 or 1 in the plaintext or the key if the only known fact about a bit is that it is represented by a 1 in the ciphertext. The direct consequence of this is that all outcomes are equally probable, thus making the cipher impossible to break [2]. The procedure might also be demonstrated by table 1 and 2. To use the one-time pad by classical cryptographic means has proven to be quite a challenge. One of the major drawbacks of the one-time pad is the key distribution. Since each key has to be unique one cannot use a single key twice, because of the critical drawback a ciphertext might have is that it is repetitive in one way or another. This means that for every plaintext sent from Alice to Bob, they must share a common key of the same length as the plaintext. There are no completely secure, or even very efficient, ways of classical key distribution. If the key somehow falls into the hands of Eve between the time that Alice and Bob share it and the time when they send the message, Eve will have complete access to the information. Quantum mechanics does however offer a solution to this problem [1]. 3

Plaintext A: 0 1 0 0 1 1 0 0 0 1 1 1 0 0 1 1 Key A: 0 0 1 1 0 1 1 1 0 1 1 1 1 0 0 0 Ciphertext A: 0 1 1 1 1 0 1 1 0 0 0 0 1 0 1 1 Table 1: Alice encrypts the plaintext with the help of a key into a ciphertext which she sends to Bob. Ciphertext B: 0 1 1 1 1 0 1 1 0 0 0 0 1 0 1 1 Key B: 0 0 1 1 0 1 1 1 0 1 1 1 1 0 0 0 Plaintext B: 0 1 0 0 1 1 0 0 0 1 1 1 0 0 1 1 Table 2: Bob decrypts the ciphertext sent by Alice into the plaintext by using their common key. 2.2 Basics of Quantum Mechanics 2.2.1 The qubit - encoding bits to physical states All information needs to be encoded in some kind of physical state. In the field of quantum information, digital information is encoded onto the physical states of particles such as photons. These states can be described as a qubit - a quantum bit, which exists in a two-dimensional Hilbert space and can be represented by a Bloch sphere, which is a unit sphere. Since it is a generalization of a classical bit, the qubit can be in one of two arbitrary orthogonal basis states 0 or 1, and take on any superposition of these states. This superposition of states can be written as ψ = α 0 ± β 1 (1) where α 2 is the probability that a measurement would find the particle in state 0, while β 2 being the probability that a measurement would find it in state 1. In our case, the particle and state in question is the photon and its polarization. If one describes light as a wave, the polarization can be seen as the way it is rotated. The basis vectors 0 and 1 are then in this case horizontal, H, and vertical, V, polarization, respectively. The basis vectors can also be changed by rotating the polarization, for example to + and by a rotation of 45. 2.2.2 Indistinguishability One of the fundamental principles of quantum mechanics is the impossibility of distinguishing between non-orthogonal states. To explain this one needs to look into the properties of the diagonal state, +. When a photon in the + state is going through an optical instrument such as a polarization beam splitter (PBS), it is either reflected or transmitted randomly. A photon in the H state would however always be transmitted, and one in the V state always reflected. Hence the instrument s name; it splits the beam according to the polarization of the photons. This can also more generally be described as that the V state has equal probabilities to collapse either into the H or V state when measured. If then the polarization was to be turned diagonally with an instrument such as a half-wave plate, one would also shift the basis vectors. As such, the results for the H and V states would now be random, and the + and states would always be transmitted and reflected respectively. This demonstrates that the measurement of states other than the basis vectors will always render a random result, and because of this there is no way of knowing the state of a particle before it was measured. The conclusion that must be drawn from this is that there is no quantum measurement that is capable of deterministically distinguishing between non-orthogonal states. 2.2.3 No-Cloning Theorem Not only does the nature of quantum mechanics prevent us from distinguishing non-orthogonal states, it also forbids perfect cloning of an unknown state. That the state is unknown is crucial 4

since one could for example easily create a second photon with H polarization if one knows that this is the polarization of the first photon. To prove that this is not possible for an unknown state, let us imagine a unitary transformer U which is able to perfectly clone the state ψ onto a second photon ψ = α H + β V (2) U ψ 0 = U(α H + β V ) 0 = α H H + β V V (3) The resulting composite state should now be equal to the state ψ ψ, however ψ ψ = α 2 H H + αβ H V + αβ V H + β 2 V V (4) 2.2.4 Entanglement ψ ψ = U ψ 0 (5) Entanglement is when two or more particles can only be described by one single quantum state, which cannot be separated into product states. If then two particles are entangled and the state of the first particle is measured, one will immediately ascertain the state of the second particle. The relation between particles can be either correlated - the states are identical - or anti-correlated - the states are orthogonal. Eq. (6) is a correlated entangled state, while eq. (7) is an anti-correlated entangled state. Entanglement does not depend on the distance between the entangled states; it has been observed experimentally between two photons at a distance of 144 km [3]. Ψ ± = 1 2 ( H 1H 2 ± V 1V 2 ) (6) Φ ± = 1 2 ( H 1V 2 ± V 1H 2 ) (7) Entangled photons can be created in many ways, e.g. spontaneous parametric down-conversion in a non-linear BBO (beta-barium borate) crystal, which is the case in this experiment. 2.2.5 Bell s Theorem In 1935 Einstein, Podolsky and Rosen [4] published their famous paper regarding their doubts on the completeness of quantum mechanics. They were especially doubtful concerning the concept of entanglement, since according to Einstein s theory of special relativity nothing can communicate or interact faster than the speed of light. They considered this principle to be violated if one could instantaneously determine the state of the other particle in the entangled pair. Instead they proposed a local hidden variable theory to describe the phenomenon. Opposite to this view was the Copenhagen interpretation of quantum mechanics. In 1964 John Bell [5] published a paper stating that no hidden variable theory could possibly reproduce the predictions of quantum mechanics. He stated that any hidden variable theory always had to satisfy a Bell inequality, whilst quantum mechanics could under some circumstances violate it. There was nevertheless no suitable method of determining which of these was the correct way for describing entanglement until 1969, when Clauser, Horne, Shimony and Holt [6] proposed a way of doing this. They determined this Bell inequality to value of S 2, which is calculated from the correlation functions E as S = E(a,b) E(a,b ) + E(a,b) + E(a,b ) (8) where a, a, b and b are the rotation angles of the basis vectors for the two states and a = a + 45 and b = b + 45. The maximum violation of the Bell inequality S = 2 2 is achieved with the Bell angles 0, 22,5, 45 and 67,5 as a, a, b and b respectively. The correlation function E is defined by P HH, P HV, P V H and P V V the entangled photons. E(α,β) = P HH P HV P V H + P V V (9) are the probabilities for measuring coincidences between H and V for 5

2.3 Quantum Cryptography The main focus in this report will be on the BB84 protocol. In this protocol Alice generates a pair of photons which are entangled in polarization in one of two bases, usually HV and +. The base of polarization is determined completely randomly for each photon. One of the photons is sent to Bob and one to herself. Alice now randomly chooses a base in which to measure, either HV or +, and depending on the polarization of the photon Alice will get a hit in either a detector representing the bit 0 or the bit 1. This means that if a photon with the polarization H measured in HV always goes to the detector for H, thereby giving the bit 0. If it is however measured in + there is a 50% probability for it to be detected in + and 50% probability for it to be detected in. This because of the indistinguishability of non-orthogonal states [7]. Bob must also choose base at random and independent of Alice s choices. Since the two photons were entangled in polarization, Alice and Bob will have either correlated or anti-correlated results. This only applies if they are measuring in the same base; otherwise the result will be completely random and not correlated at all. When Bob has received a sufficient amount of bits from Alice he will communicate with her through a classical channel. Now they tell each other in which base they measured each photon. They will save the data where they measured in the same base, and delete the data where they measured in different bases. Then they choose some random photons of which they tell each other the polarization and by so doing they can see how good their results match. When the error rate has been calculated from this information they can know if Eve has been listening. This is called quantum key distribution, since what Alice sent was not the actual message, but a one-time pad key. If no eavesdropper was detected the message can be sent through a classical channel with perfect security [8]. The reason for why Alice and Bob can know if they have been eavesdropped upon by this mean of detection is the fact that no one can eavesdrop without creating errors. By using the interceptresend method Eve will intercept a photon sent from Alice to Bob and measure it in a randomly chosen base. If this base is not the same as both Alice and Bob measures in, Eve will introduce an error with a probability of 50%. For example, suppose Alice and Bob measures in base HV and Alice knows that she sent a photon with H polarization. If Eve was to intercept Bob s photon and measure it in + she would detect that it is either a + or photon. She would then generate a photon of the measured polarization. No matter if the polarization is + or there would be a 50% probability of Bob detecting it as H and 50% probability of detecting it as V, thus leading to an average 25% error in bits [9]. There are however more efficient ways of eavesdropping, but to counter them there are measures to enhance the security by privacy amplification techniques [10]. This together with the classical error correction that every raw key generated in practice must go through [11] leaves a 10.5% error rate that the transmission between Alice and Bob must be below for perfect security and privacy in communication. An eavesdropper can also be detected by using Bell s inequality. By using the Bell angles the maximum theoretical Bell value in quantum mechanics, 2 2, will be achieved, thus violating the inequality. This only applies to entangled states, meaning that if Eve intercepts the photon and measures it she will break the entanglement and instead create a mixed state. The theoretical value for a mixed state in Bell angles is 2. 3 Experiment The aim of the experiment was to detect the presence of an eavesdropper in quantum key distribution. In this section we will describe the experimental procedure in further detail. As stated in eq. (8) and (9), the probabilities for the different coincidences was obtained in order to calculate the value S. This is needed to determine whether the Bell inequality has been violated and consequently if an eavesdropper has been present. This experiment utilized a compact source of polarization-entangled photon pairs at a wavelength of 805 nm using a violet single-mode laser diode as the pump source of type-ii spontaneous downconversion [12]. The two output beams depicted in fig. 1 are in the intersections between two cones consisting of H and V polarized photons. These two intersection beams contain the entangled photons. In order to correct the phase shift introduced by the first BBO crystal the beams were 6

Figure 1: A schematic image of the setup. BBO 1 and BBO 2 stands for beta-barium borate crystal, with BBO 2 at half the length of BBO 1 ; λ/2 stands for half-wave plate; mirrors are grey rectangles and flip mirrors dashed grey rectangles; squares with diagonals are PBS; half circles are measurement stations. The 1 and 0 indicates the bit each detection produces. directed towards a second BBO crystal with half the length of the first. Then followed a half-wave plate (λ/2) which was set at a specific angle to change the basis vectors the analysis stations measure in. In the lower output beam, the ability to introduce an eavesdropper Eve was included through flip mirrors (dashed) set at a 45 angle to the incoming beam. It is crucial that the beam continues as if it was a straight line after going through Eve to Alice, as if Eve never intercepted it. In this setup Eve is more correctly described as a simulated eavesdropper, who will introduce errors by shifting the phase of the photons. The phase shift is a result of the difference in distance between path of the original and the intercepted beam. If Eve would have used real detectors this phase shift would have been introduced because of the impossibility of generating photons at a desired phase. The measurement stations of Alice and Bob each include a PBS and two output ports connected to a coincidence counter unit through optical fibers, which was in turn connected to a computer which records the coincidence data. The experiment consisted of measuring these coincidences for the Bell angles, which were set at the half-wave plates. The coincidences were then measured over a period of 20 seconds for each angle of which an average was taken for each coincidence. Additionally, measurements were made for the bases of HV and +, for both an absent and a present Eve. This in order to calculate the error rate e, which was later used to calculate the binary entropy h(e). Eq. (12) represents the number of useful bits left after both error correction and privacy amplification. e = NHH + NV V N HH + N V V = (10) N tot N HH + N HV + N V H + N V V h(e) = e log 2 e (1 e) log 2 (1 e) (11) K = N tot(1 2h(e)) (12) If the number of usable bits K is less than or equal to 0 it is certain that Eve has acquired the whole key which consequently renders it unsecure. 7

4 Results 4.1 Detection of eavesdropper by Bell s inequality The collected data on coincidences was used to calculate the Bell inequality with eq. (8) and (9). Table 3 represents the values of E(α,β) for all Bell angles determined for the setup without Eve. Angle α Angle β E(α,β) 0 22.5 0.67 ± 0.04 0 67.5 0.65 ± 0.04 45 22.5 0.71 ± 0.04 45 67.5 0.59 ± 0.04 Table 3: Angle α represents the base chosen by Alice and angle β the one chosen by Bob. E(α,β) is determined by eq. (9). With these values of the correlation function E(α,β) the Bell value can be determined to S = 2.62 ± 0.08 (13) Which is a value that violates the bell inequality by 8 standard deviations. Table 4 represents the values of E(α,β) for all Bell angles determined for the setup with Eve. Angle α Angle β E(α,β) 0 22.5 0.72 ± 0.04 0 67.5 0.49 ± 0.04 45 22.5 0.31 ± 0.04 45 67.5 0.11 ± 0.03 Table 4: Angle α represents the base chosen by Alice and angle β the one chosen by Bob. The base of Eve, HV, is constant. E(α,β) is determined by eq. (9). The value of the Bell inequality with a simulated eavesdropper was determined to S = 1.40 ± 0.07 (14) This value of S satisfies the inequality and is deviating at its most by 6% from the theoretical value for a mixed state. 4.2 Detection of eavesdropper by error rate By using the data of coincidences with eq. (10) the average error rate for the test without Eve was determined to 4.4%. According to eq. (12) this will result in 885 bits per second. With Eve in the setup the average error rate was determined to 31% and according to eq. (12) resulting in a negative amount of bits, meaning that no useful bits can be generated and that Eve has more information about the key than the amount that is shared by Alice and Bob. 4.3 Errors in measurement due to dark current Dark current in the detectors causes them to detect photons hits even when no photons are being transmitted - a dark count. This dark count was measured by blocking the photon source and minimizing other sources of light present. In the V detector of Alice the dark count was approximately 2000 counts per second, while the other detectors had a dark count of approximately 500 counts per second. 8

5 Discussion The satisfaction and violation of the Bell inequality for the presence and absence of Eve respectively, rendered by our data strongly indicates that all eavesdropping on a quantum channel by the intercept-resend method will introduce errors to such a degree that it can be detected. This conclusion can be drawn from the fact that a quantum mechanical system cannot be described in a classical sense of physics. Quantum mechanics forbids one to measure something without changing it. The negative and positive usable key rate for the both cases also demonstrates this. The results correctly showed that an eavesdropper will change the original state of entanglement into a mixed state and thereby errors will always be introduced. The base error rate was determined to 4.4%, which is sufficiently less than the maximum error rate of 10.5%, to make our results credible. The error introduced by Eve should because of this be 29,4%, but the value determined in the experiment was 31%. The difference in error can be credited to misalignment caused by the flip mirrors, but even so the difference was marginal and well above both the 25% and 10.5% limit. The fact that we did not achieve the theoretical values originates from a number of error sources. These include dark counts in the detectors, which fortunately caused almost no coincidences. Ideally the dark count could have been eliminated by cooling the detectors with e.g. liquid helium. Alas, such equipment was not available for the experiment. The excess amount coincidences were caused by misalignment, especially the one caused when the flip mirrors were turned up and down. After each time they were flipped adjustments had to be made to once more direct the photons into the multi-mode fiber leading to the detector. 6 Conclusion The data strongly indicates that it is impossible to eavesdrop upon a quantum channel by using the intercept-resend method without causing a sufficiently large amount of errors for the attack to be detected. 7 Acknowledgments We would like to thank Prof. Mohamed Bourennane from the Quantum Information & Quantum Optics group at the Department of Physics at Stockholm University, whose great mentorship and expertise has been of utmost importance for this research. Many great thanks goes to Ph.D. student Johan Ahrens and Assistant Professor Hannes Hübel for providing help and support when needed. Our final thanks goes to the organizers of the Research Academy for Young Scientists for making this research possible. 9

References [1] Orvado I. Free-Space Quantum Cryptography. München: LMU. 2006. [2] Fox M. Quantum Optics : An Introduction. Cippenham: Oxford University Press. 2007. [3] Rådmark M. Photonic quantum information and experimental tests of foundations of quantum mechanics. Stockholm: Stockholm University. 2009. [4] Einstein A, Podolsky B, Rosen N. Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? Phys. Rev. 47, 777-780. 1935. [5] Bell JS. On the Einstein-Podolsky-Rosen paradox. Physics. 1/1964, 195-200. 1964. [6] Clauser JF, Horne MA, Shimony A, Holt RA. Proposed experiment to test local hiddenvariable theories. Phys. Rev. Lett. 23, 880-884. 1969. [7] Bennett CH, Brassard G. Quantum Cryptography: Public Key Distribution and Coin Tossing. International Conference on Computers, Systems and Signal Processing. 1984 Dec 10-12: Bangalore, India. [8] Jennewein T, Simon C, Weihs G, Weinfurter H, Zeilinger A. Quantum Cryptography with Entangles Photons. Phys. Rev. Lett. 84, 4737-4740. 2000. [9] Gisin N, Ribordy G, Tittel W, Zbinden H. Quantum cryptography. Reviews of Modern Physics. 74, 181-182. 2002. [10] Bennett CH, Brassard G, Crépeau C, Maurer UM. IEEE Trans. Inf. Theory 41, 1915. 1995. [11] Bennett CH, Brassard G. Journal of Cryptology. 5, 3. 1992. [12] Trojek P, Schmid C, Bourennane M, Weinfurter H, Kurtsiefer. Companct souce of polarization-entangled photon pairs. Opt. Express. 12, 276-281. 2004. 10