{"id":23444,"date":"2014-05-28T22:45:26","date_gmt":"2014-05-29T02:45:26","guid":{"rendered":"http:\/\/www.opensource.im\/?p=23444"},"modified":"2014-05-28T22:45:26","modified_gmt":"2014-05-29T02:45:26","slug":"quantum-cryptography-with-ordinary-equipment","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/quantum-cryptography-with-ordinary-equipment.php","title":{"rendered":"Quantum Cryptography with Ordinary Equipment"},"content":{"rendered":"<p><p>    Researchers in Japan have come up with a way of doing quantum    cryptography that could overcome two of the technology's big    problems. The new protocol is designed to work with    off-the-shelf equipment and use less bandwidth than existing    methods. Its just a mathematical proposal, but it could help    make quantum key distribution more commercially viable.  <\/p>\n<p>    With an encrypted message, the sender and recipient share a key    that unscrambles its contents. Ensuring that the key hasn't    been stolen is the problem. With quantum    cryptography, the key is created at the sender and receiver    by transmitting photons over fiber-optic lines. The polarity of    a photona quantum property that says whether it is oscillating    vertically or at anglecan be determined by the receiver and    compared with a second \"entangled\" photon created at the same    time. The polarity of the photons is translated into bits that    make up a key to decrypt messages.  <\/p>\n<p>    With quantum key distribution, the security of the transmission    is assured by the     Heisenberg uncertainty principle. If an eavesdropper tries    to intercept the key, it will change the state of the paired    photonsan event that can be detected by the sender of the key.  <\/p>\n<p>    In research published in Nature    last week, the Japanese team describes a method for securing    communications that doesnt rely on the uncertainty principle    and needs no regular measurement to see if the key's been    tampered with.  <\/p>\n<p>    With this technique, photons are sent over an optical fiber    using ordinary lasers, rather than specialized equipment    usually needed to create quantum keys. The laser emits a train    of photons and a device called a phase modulator imparts a    phase on them.  <\/p>\n<p>    The receiver splits the signal into two separate signals with a    randomly generated delay between them. Then those two signals,    which are oscillating waves, are superimposed and detected on    the receiving end. The combined waves could be out of phase and    cancel each out or they could be in phase and create a bigger    wave.  <\/p>\n<p>    The phase difference between pulses can then act as bits that    can make up a key to decrypt the message. For example, pulses    with the same phase are a bit value of zero, while pulses with    a different phase are a bit value of one. When the    receiverwho, by convention, is called Bobdetects a photon, he    learns whether the superimposed pulses have the same or    different phase. Then he tells the sender, called Alice, what    the relevant pulse numbers are. Because the sender records all    the pulses, she can determine the bit value based on what Bob    tells her, explains co-author Masato Koashi from the University    of Tokyo.  <\/p>\n<p>    In an email, Koashi from the University of Tokyo describes how    the key is protected from theft by an intruder, called    Eve:  <\/p>\n<p>      One of the keys to securing the communication is to send a      large number of optical pulses but they are very weak such      that they amount to only a few photons in total. Hence, even      if Eve waits forBob to announce the numbers for two      pulses and then measures Alice's signal, the chances of Eve's      detecting any photon in the two relevant pulses are very low.    <\/p>\n<p>      Another key is the fact that Bob generates the delay      randomly. Eve may measure Alice's signal immediately and      learn the phases of a few pulses. Eve then tries to      manipulate Bob's announcement to fall on those pulses for      which she has learned the phases. The random      delayprevents such a manipulation.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/spectrum.ieee.org\/tech-talk\/computing\/networks\/quantum-cryptography-with-conventional-lasers\/RK=0\/RS=Uj7U.gtbf4b0.UG3ncXIMupGje0-\" title=\"Quantum Cryptography with Ordinary Equipment\">Quantum Cryptography with Ordinary Equipment<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Researchers in Japan have come up with a way of doing quantum cryptography that could overcome two of the technology's big problems. The new protocol is designed to work with off-the-shelf equipment and use less bandwidth than existing methods<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-23444","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23444"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=23444"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/23444\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=23444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=23444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=23444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}