Paper 4, Section I, G

Coding and Cryptography | Part II, 2012

Describe the BB84 protocol for quantum key exchange.

Suppose we attempt to implement the BB84 protocol but cannot send single photons. Instead we send KK photons at a time all with the same polarization. An enemy can separate one of these photons from the other K1K-1. Explain briefly how the enemy can intercept the key exchange without our knowledge.

Show that an enemy can find our common key if K=3K=3. Can she do so when K=2K=2 (with suitable equipment)?

Typos? Please submit corrections to this page on GitHub.