Quantum cryptography has yet to deliver a truly unbreakable way of sending messages. Quantum entanglement may change that
RECENT revelations of online snooping on an epic scale, by government agencies which may well have been breaking the law, have prompted some users of the internet to ask who you can trust with sensitive data these days. According to Artur Ekert, an Oxford academic who moonlights as director of the Centre for Quantum Technologies (CQT) in Singapore, one possibility is a defunct Irish physicist called John Stewart Bell.
In 1964 Bell proposed a test to settle once and for all whether quantum mechanics really is as weird as it famously appears to be, in that it allows for instantaneous communication between two particles, no matter how far apart they are, on condition that they were once entangled together in the same place. The short answer, as experiments carried out over subsequent decades have shown, is yes, it is. Bell’s test, however, also led physicists like Dr Ekert to a remarkable insight: made sufficiently sensitive the Bell test could be used to guarantee perfectly secure communication—even if the equipment used to send and receive those communications had been sold to you by a manufacturer subverted by your enemies.
The current way quantum theory is employed in cryptography, known as “prepare and measure”, works by distributing a secret key, encoded in the way light is polarised, to two people (known conventionally as Alice and Bob) who wish to talk privily with each other. This key is used to encrypt a message so that it cannot be understood, even if it is intercepted. Prepare-and-measure looks good in theory because an eavesdropper (Eve) listening in will perforce give herself away by measuring the light’s polarisation, and thus disrupting the system. If that happens, Alice and Bob can ditch the compromised key and ask for another.
However, if Eve can somehow tinker with the sending and receiving equipment (for example by blinding it with a special kind of laser, as happened in one famous quantum hack in 2010, or getting the manufacturer to do something similar), she can hide her disruption, leaving Bob and Alice none the wiser. The technique therefore ceases to be secure. Given recent revelations about Western-government activities in this area, and strong suspicions about pressure the Chinese government puts on the country’s computer and telecoms firms, users’ fears that their equipment might not be all it says it is are hardly paranoid. The Bell test promises to assuage those fears.
For whom the Bell tallies
Bell-based cryptography also works by generating a key based on the polarisation of light. But it begins by using a special machine to produce the particles of light (called photons) in which the message will be encoded. This machine turns them out as entangled pairs. One member of each pair goes to Alice, and one to Bob. For each photon she receives, Alice chooses at random which of two predetermined polarisation angles to measure. For each measurement, she can get one of two results: either the photon will appear aligned with her polarisation axis (call that a one) or perpendicular to it (call it zero). This can be used to encode a digital bit. Bob, for his part, also measures his photon’s polarisation. Both of his axes, too, have been arbitrarily set.
Conventional odds in the world of classical physics predict Alice’s and Bob’s bits will match three times out of four. Add in quantum entanglement, though, and the odds increase to just over 85%. This was the essence of Bell’s insight.
If Alice and Bob’s measurements agree more often three-quarters of the time, it suggests their photons are entangled. That means they cannot have been intercepted, since any attempt by Eve to do so would inevitably cause them to untangle. If Alice and Bob then each add a third, identical polarisation angle, they can use this extra bit, which they know they must share, to encode the cryptographic key.
The Latest on: Unbreakable cryptography
- Absolute Protects Patient Data and Supports HIPAA Compliance for Apria Healthcareon January 16, 2020 at 4:00 am
Absolute’s Persistence technology, the foundation of the company’s Resilience solution, enables a self-healing, unbreakable two-way connection to endpoints ... I have a dashboard with a snapshot of ...
- The Cyberlaw Podcast: The Line Between Deepfake Legislation and Deeply Fake Legislationon January 15, 2020 at 5:24 pm
In contrast, India seems serious about imposing liability on companies whose unbreakable end-to-end crypto causes harm, at least to judge from the howls of the usual defenders of such crypto. David ...
- Apple’s Refusal to Create iPhone Backdoor Pits Public Safety Against Personal Privacyon January 15, 2020 at 12:21 pm
U.S. tech firms, such as Amazon, have criticized such laws. FBI Chief Calls Unbreakable Encryption 'Urgent Public Safety Issue' The inability of law enforcement authorities to access data from ...
- Quantum Xchange Adds Post-Quantum Cryptography to Its Leading Quantum-Safe Key Management System Phio TXon January 14, 2020 at 5:00 am
/PRNewswire/ -- Quantum Xchange, a leading provider of secure communications for a quantum-safe world, today announced the availability of ...
- Japan test makes leap in quantum cryptography developmenton January 14, 2020 at 1:50 am
Many countries have been rushing to put quantum cryptography into practical use as, if a quantum computer is completed, it could break the current code used by slower systems in internet security and ...
- Toshiba, Tohoku Univ. use quantum cryptography to transmit genome dataon January 13, 2020 at 10:45 pm
TOKYO -- Japanese electronics giant Toshiba Corp. and Tohoku University announced that they have succeeded in transmitting the full genome sequence data of 24 people using quantum cryptography, which ...
- Start-ups join Google, SpaceX and OneWeb to bring new technologies to spaceon January 13, 2020 at 3:51 pm
Hundreds of start-ups have flocked to the space sector, joining Google and SpaceX in bringing sophisticated technologies that include artificial intelligence and quantum computing to space.
- Is the FBI Gearing Up for Another Encryption Fight with Apple?on January 9, 2020 at 7:09 am
Gruber suspects that the FBI is fully aware of this and that the agency’s request to Apple is more about turning public opinion against unbreakable encryption so that it will become politically ...
- F.B.I. Asks Apple to Help Unlock Two iPhoneson January 7, 2020 at 1:01 pm
The request could reignite a fight between the Silicon Valley giant and law enforcement over access to encrypted technology. SAN FRANCISCO — The encryption debate between Apple and the F.B.I. might ...
- Inside the race to quantum-proof our vital infrastructureon January 6, 2020 at 12:09 am
Any such discrepancy will cause the key to be rejected. Properly implemented, QKD can be considered as a provably unbreakable method of exchanging keys. There's a certain rivalry between physics and ...
via Google News and Bing News