In: Physics
. (a) Draw the basic setup for quantum key distribution.
(b) Explain the “intercept-resend” attack that Eve can attempt (draw a simple figure).
(c) Explain how this attack is thwarted by the quantum key distribution protocol. How can Eve’s attack be detected?
(d) What does the security of quantum key distribution rely on fundamentally?