Quantum Cryptography with Ordinary Equipment

Researchers in Japan have come up with a way of doing quantum cryptography that could overcome two of the technology's big problems. The new protocol is designed to work with off-the-shelf equipment and use less bandwidth than existing methods. Its just a mathematical proposal, but it could help make quantum key distribution more commercially viable.

With an encrypted message, the sender and recipient share a key that unscrambles its contents. Ensuring that the key hasn't been stolen is the problem. With quantum cryptography, the key is created at the sender and receiver by transmitting photons over fiber-optic lines. The polarity of a photona quantum property that says whether it is oscillating vertically or at anglecan be determined by the receiver and compared with a second "entangled" photon created at the same time. The polarity of the photons is translated into bits that make up a key to decrypt messages.

With quantum key distribution, the security of the transmission is assured by the Heisenberg uncertainty principle. If an eavesdropper tries to intercept the key, it will change the state of the paired photonsan event that can be detected by the sender of the key.

In research published in Nature last week, the Japanese team describes a method for securing communications that doesnt rely on the uncertainty principle and needs no regular measurement to see if the key's been tampered with.

With this technique, photons are sent over an optical fiber using ordinary lasers, rather than specialized equipment usually needed to create quantum keys. The laser emits a train of photons and a device called a phase modulator imparts a phase on them.

The receiver splits the signal into two separate signals with a randomly generated delay between them. Then those two signals, which are oscillating waves, are superimposed and detected on the receiving end. The combined waves could be out of phase and cancel each out or they could be in phase and create a bigger wave.

The phase difference between pulses can then act as bits that can make up a key to decrypt the message. For example, pulses with the same phase are a bit value of zero, while pulses with a different phase are a bit value of one. When the receiverwho, by convention, is called Bobdetects a photon, he learns whether the superimposed pulses have the same or different phase. Then he tells the sender, called Alice, what the relevant pulse numbers are. Because the sender records all the pulses, she can determine the bit value based on what Bob tells her, explains co-author Masato Koashi from the University of Tokyo.

In an email, Koashi from the University of Tokyo describes how the key is protected from theft by an intruder, called Eve:

One of the keys to securing the communication is to send a large number of optical pulses but they are very weak such that they amount to only a few photons in total. Hence, even if Eve waits forBob to announce the numbers for two pulses and then measures Alice's signal, the chances of Eve's detecting any photon in the two relevant pulses are very low.

Another key is the fact that Bob generates the delay randomly. Eve may measure Alice's signal immediately and learn the phases of a few pulses. Eve then tries to manipulate Bob's announcement to fall on those pulses for which she has learned the phases. The random delayprevents such a manipulation.

Read more:
Quantum Cryptography with Ordinary Equipment

Related Posts
This entry was posted in $1$s. Bookmark the permalink.