CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”

This paper is based on previous quantum encryption proposed by researchers developing a scheme for cryptography using symmetric keys. This study has pointed out that the scheme consists of a pitfall that could lead to a controlled-NOT (CNOT) extraction attack. A malicious user can obtain the secret message of a sender without being detected by using a sequence of single photons and a controlled-NOT gate.