We have used deterministic single-photon two qubit (SPTQ) quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the Rényi information obtained by Eve as a function of the errors she imparts to Alice and Bob's sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob's physical receiver module. This experiment illustrates the utility of an efficient deterministic quantum logic for performing realistic physical simulations of quantum information processing functions. [5] show that the most powerful individual-photon attack can be accomplished with a controlled-not (cnot) gate. As illustrated in Fig. 1, Eve supplies the target qubit to the cnot gate, which entangles it with the BB84 qubit that Alice is sending to Bob. Eve then makes her measurement of the target qubit to obtain information on the shared key bit at the expense of imposing detectable errors between Alice and Bob [5,6]. We have recently shown [6] that this Fuchs-PeresBrandt (FPB) entangling probe can be implemented using single-photon two-qubit (SPTQ) quantum logic in a proof-of-principle experiment. In SPTQ logic a single photon carries two independent qubits: the polarization and the momentum (or spatial orientation) states of the photon. Compared to standard two-photon quantum gates, SPTQ gates are deterministic and can be efficiently implemented using only linear optical elements. We have * Electronic address: thkim@mit.edu previously demonstrated cnot [7] and swap [8] gates in this SPTQ quantum logic platform. SPTQ logic affords a simple yet powerful way to investigate few-qubit quantum information processing tasks.In this work we use SPTQ logic to implement the FPB probe as a complete physical simulation of the most powerful attack on BB84, including physical errors. This is to our knowledge the first experiment on attacking BB84, and the results are in good agreement with theoretical predictions. It is only a physical simulation because the two qubits of a single photon carrier must be measured jointly, so that Eve needs access to Bob's receiver, but not his measurement. The SPTQ probe could become a true attack if quantum nondemolition measurements were available to Eve [6]. Nevertheless, the physical simulation allows investigation of the fundamental security limit of BB84 against eavesdropping in the presence of realistic physical errors, and it affords the opportunity to study the effectiveness of privacy amplification when BB84 is attacked. In BB84, Alice sends Bob a single photon randomly chosen from the four polarization states of the horizontalvertical (H-V ) and ±45• (D-A) bases. In the FPB attack, Eve sets up her cnot gate with its control-qubit computational basis, {|0 C , |1 C }, given by π/8 rotation from the BB84 H-V basis, as shown in Fig. 2(a), |0 C = cos(π/8)|H ...