Provided we are agreed that an optical fibre behaves as a mirror for the purposes vampirism, shining R-photons into a fibre make photons come out the far end.
Therefore, you can perform a vampire-in-the-middle attack on quantum cryptography: the endpoints see no difference with an interposed vampire, but you observe the stream of S-photons reflected off the vampire.
It's always the way. Like with quantum. You come up with some greater understanding of physics of photons, or whatever. And this both smashes what was previously thought to be an unbreakable encryption, and provides some new unbroken encryption model.
And adds a new (metaphorically) colourful member to our cast of cryptographic characters:
Alice the Sender Bob the Receiver Eve the Eavesdropper Vlad the Vampire
Provided we are agreed that an optical fibre behaves as a mirror for the purposes vampirism, shining R-photons into a fibre make photons come out the far end.
Therefore, you can perform a vampire-in-the-middle attack on quantum cryptography: the endpoints see no difference with an interposed vampire, but you observe the stream of S-photons reflected off the vampire.
It's always the way. Like with quantum. You come up with some greater understanding of physics of photons, or whatever. And this both smashes what was previously thought to be an unbreakable encryption, and provides some new unbroken encryption model.
And adds a new (metaphorically) colourful member to our cast of cryptographic characters:
Alice the Sender
Bob the Receiver
Eve the Eavesdropper
Vlad the Vampire
:)