HAR 2009: Revealing How We Eavesdropped on a Perfect Quantum Cryptographic Key π (Part 1/6)
Discover the groundbreaking methods used in 2009 to intercept 100% of a quantum cryptographic key, challenging assumptions about its invulnerability. Join Ilja Gerhardt and Vadim Makarov as they explore the security of quantum communication systems in thi

Christiaan008
7.0K views β’ Sep 17, 2009

About this video
Clip 1/6
Speakers: Ilja Gerhardt, Vadim Makarov
Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key.
The actual eavesdropping hardware we have built will be shown during the conference.
A brief intro into quantum cryptography will be given at the beginning of the talk. Then, Vadim Makarov will explain the above attack. At the end of the talk, Ilja Gerhardt will (hopefully) present another application of the discovered detector vulnerability, which shall remain a surprise :)
For more information go to: https://har2009.org/program/events/168.en.html
Speakers: Ilja Gerhardt, Vadim Makarov
Quantum cryptography, as being based on the laws of physics, was claimed to be much more secure than all classical cryptography schemes. (Un)fortunately physical hardware is not beyond of an evil control: We present a successful attack of an existing quantum key distribution system exploiting a photon detector vulnerability which is probably present in all existing devices. Without Alice and Bob losing their faith in their secure communication, we recorded 100% of the supposedly secret key.
The actual eavesdropping hardware we have built will be shown during the conference.
A brief intro into quantum cryptography will be given at the beginning of the talk. Then, Vadim Makarov will explain the above attack. At the end of the talk, Ilja Gerhardt will (hopefully) present another application of the discovered detector vulnerability, which shall remain a surprise :)
For more information go to: https://har2009.org/program/events/168.en.html
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
7.0K
Likes
21
Duration
9:01
Published
Sep 17, 2009
User Reviews
3.9
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.