Quantum cryptography has yet to deliver a truly unbreakable way of sending messages. Quantum entanglement may change that
RECENT revelations of online snooping on an epic scale, by government agencies which may well have been breaking the law, have prompted some users of the internet to ask who you can trust with sensitive data these days. According to Artur Ekert, an Oxford academic who moonlights as director of the Centre for Quantum Technologies (CQT) in Singapore, one possibility is a defunct Irish physicist called John Stewart Bell.
In 1964 Bell proposed a test to settle once and for all whether quantum mechanics really is as weird as it famously appears to be, in that it allows for instantaneous communication between two particles, no matter how far apart they are, on condition that they were once entangled together in the same place. The short answer, as experiments carried out over subsequent decades have shown, is yes, it is. Bell’s test, however, also led physicists like Dr Ekert to a remarkable insight: made sufficiently sensitive the Bell test could be used to guarantee perfectly secure communication—even if the equipment used to send and receive those communications had been sold to you by a manufacturer subverted by your enemies.
The current way quantum theory is employed in cryptography, known as “prepare and measure”, works by distributing a secret key, encoded in the way light is polarised, to two people (known conventionally as Alice and Bob) who wish to talk privily with each other. This key is used to encrypt a message so that it cannot be understood, even if it is intercepted. Prepare-and-measure looks good in theory because an eavesdropper (Eve) listening in will perforce give herself away by measuring the light’s polarisation, and thus disrupting the system. If that happens, Alice and Bob can ditch the compromised key and ask for another.
However, if Eve can somehow tinker with the sending and receiving equipment (for example by blinding it with a special kind of laser, as happened in one famous quantum hack in 2010, or getting the manufacturer to do something similar), she can hide her disruption, leaving Bob and Alice none the wiser. The technique therefore ceases to be secure. Given recent revelations about Western-government activities in this area, and strong suspicions about pressure the Chinese government puts on the country’s computer and telecoms firms, users’ fears that their equipment might not be all it says it is are hardly paranoid. The Bell test promises to assuage those fears.
For whom the Bell tallies
Bell-based cryptography also works by generating a key based on the polarisation of light. But it begins by using a special machine to produce the particles of light (called photons) in which the message will be encoded. This machine turns them out as entangled pairs. One member of each pair goes to Alice, and one to Bob. For each photon she receives, Alice chooses at random which of two predetermined polarisation angles to measure. For each measurement, she can get one of two results: either the photon will appear aligned with her polarisation axis (call that a one) or perpendicular to it (call it zero). This can be used to encode a digital bit. Bob, for his part, also measures his photon’s polarisation. Both of his axes, too, have been arbitrarily set.
Conventional odds in the world of classical physics predict Alice’s and Bob’s bits will match three times out of four. Add in quantum entanglement, though, and the odds increase to just over 85%. This was the essence of Bell’s insight.
If Alice and Bob’s measurements agree more often three-quarters of the time, it suggests their photons are entangled. That means they cannot have been intercepted, since any attempt by Eve to do so would inevitably cause them to untangle. If Alice and Bob then each add a third, identical polarisation angle, they can use this extra bit, which they know they must share, to encode the cryptographic key.
The Latest Bing News on:
- Cryptology, cryptography, and cryptanalysison March 22, 2020 at 5:00 pm
Cryptography is the art of creating codes ... If your key is the same length as your message, your message is basically unbreakable. But, as early cryptographers have stated, no code is unbreakable.
- Blurry Box, the Unbreakable Software Protection Technologyon March 15, 2020 at 5:00 pm
Hundreds of participants from all corners of the globe have taken part in a hackers contest aimed at cracking a game protected with Blurry Box®, the pinnacle of encryption recently ... could break the ...
- Why is Trump funding quantum computing research but cutting other science budgets?on March 13, 2020 at 9:00 am
On Wednesday, the White House brainstormed with U.S. tech companies, asking their help tracking the spread of covid-19 and misinformation about the outbreak — and analyzing vast amounts of data about ...
- Why your privacy could be threatened by a bill to protect childrenon March 10, 2020 at 10:20 am
Backers of the EARN IT Act focus on protecting children from being exploited, but security experts say the bill actually chips away at your encrypted messages. Tech companies could be forced to drop ...
- The EARN IT Act Is a Sneak Attack on Encryptionon March 5, 2020 at 4:22 pm
the event had an explicit anti-encryption message. The cumulative effect of this morning's announcements could define the geography of the next crypto wars. Child predators "communicate using ...
- FBI director warns against unbreakable encryption and ‘absolute privacy’on February 29, 2020 at 1:03 am
Senior officials like Comey argue that tech firms have a responsibility to comply with lawfully issued warrants for such data, and they argue that, by implementing unbreakable encryption ...
- Law-enforcement officials condemn unbreakable encryption with baffling claimson February 29, 2020 at 12:28 am
In recent years, law-enforcement and intelligence officials, concerned that terrorists and criminals are hiding behind unbreakable encryption, have urged Congress to require tech companies to ...
- cryptography news 2019on February 28, 2020 at 8:21 pm
And can it make codes truly unbreakable? Did Apple "goof" in taking ... revealing too much As soon as you try to crack it, the encryption changes. The hunt for the enigmatic creator(s) of Bitcoin ...
- Scientists in Scotland help develop world’s first encryption system that is ‘unbreakable’ by hackerson December 21, 2019 at 10:52 am
“This new technique is absolutely unbreakable ... Security experts have long warned that today’s encryption software will be rendered entirely obsolete by the arrival of such machines.
- Manhattan DA, law officials push for encryption legislationon April 5, 2019 at 2:20 am
A Senate bill now being drafted would effectively prohibit unbreakable encryption and require companies to help the government access data on a computer or mobile device with a warrant.
The Latest Google Headlines on:
The Latest Bing News on:
- How quantum communication is set to revolutionise cryptographyon March 24, 2020 at 5:27 am
Harun Šiljak of Trinity College Dublin writes about how the groundwork for quantum communication today will radically shape our future.
- Researchers Demonstrate the Missing Link for Ultra-Secure Quantum Interneton March 24, 2020 at 4:34 am
This notion is the foundation for applications such quantum cryptography — security that is guaranteed by the laws of quantum physics. Quantum communication over long distances, however, is also ...
- Towards an unhackable quantum interneton March 23, 2020 at 9:05 am
This notion is the foundation for applications such quantum cryptography -- security that is guaranteed by the laws of quantum physics. Quantum communication over long distances, however, is also ...
- Researchers demonstrate the missing link for a quantum interneton March 23, 2020 at 9:04 am
This notion is the foundation for applications such quantum cryptography—security that is guaranteed by the laws of quantum physics. Quantum communication over long distances, however, is also ...
- Entanglement, diamonds and a future quantum interneton March 23, 2020 at 9:03 am
Thus, it is the foundation for applications such as quantum cryptography – security guaranteed by the laws of quantum physics, as the researchers put it. Quantum communication over long distances is ...
- Picking up the quantum technology batonon March 22, 2020 at 11:32 am
And computer scientists are working towards deploying schemes for post-quantum cryptography — clever schemes by which existing computers can keep communication secure even against quantum computers of ...
- QNu Labs unveils 2 products for data security, privacyon March 19, 2020 at 4:59 am
homeland security, government's critical infrastructure, finance, and healthcare," said QNu Labs co-founder and chief executive Sunil Gupta on the occasion. The product roadmap includes development of ...
- Global Quantum Cryptography Industryon March 17, 2020 at 8:58 pm
Quantum Cryptography market worldwide is projected to grow by US$2. 6 Trillion, driven by a compounded growth of 32.
- Prepare Now for Year Y2Q Quantum Threatson March 17, 2020 at 10:00 am
That’s why researchers and security firms are racing to develop new approaches to cryptography that will be able to withstand future quantum attacks mounted by hackers. There are two main types of ...
- Quantum Computing Market- Overview and scope, Global Industry Trends, Share, Size and Forecast Report By 2025on March 16, 2020 at 2:54 am
Sample Infographics: Market Dynamics: 1. Market Drivers 1.1 Increasing use of quantum cryptography to secure mobile transactions 1.2 Increasing incidences of cybercrime 1.3 Increasing adoption of ...