{"id":29994,"date":"2015-03-23T10:43:46","date_gmt":"2015-03-23T14:43:46","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/improving-quantum-cryptography-with-twisted-light.php"},"modified":"2015-03-23T10:43:46","modified_gmt":"2015-03-23T14:43:46","slug":"improving-quantum-cryptography-with-twisted-light","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/improving-quantum-cryptography-with-twisted-light.php","title":{"rendered":"Improving Quantum Cryptography with Twisted Light"},"content":{"rendered":"<p><p>Category: Science    & Technology    Posted: March 23, 2015 06:33AM    Author: Guest_Jim_*    <\/p>\n<p>      Securing communications is of great importance to many, so a      system that is protected from intrusion by the laws of      physics is highly desirable. Quantum cryptography is such a      system and many are working on various ways to improve the      methods of using it. Researchers at the University of      Rochester have recently found that using twisted light can      improve security even more.    <\/p>\n<p>      So-called twisted light uses orbital angular momentum (OAM)      to encode information, instead of polarization, a more common      option. The researchers were able to show that by using OAM      and angular position they could encode a seven dimensional,      or letter alphabet with the photons. This alphabet is      important for quantum key distribution (QKD), which is the      start of quantum cryptography. To use QKD the users will      encode the key with this alphabet onto the photons. Only if      both the sender and receiver are measuring along the same      dimension will they get the same key, and by comparing what      was original sent and received, both parties can determine      the key without publicly transmitting what it is. An      eavesdropper would disrupt the transmission in a detectable      way, thereby allowing the users to avoid interception.    <\/p>\n<p>      Thus far the researchers have demonstrated their system      working at 4 kHz with 93% accuracy, so the researchers still      have some work to do before reaching the long term goal of a      GHz rate. Besides the quantum cryptography applications, this      new system also allows for each photon to carry 2.05 bits of      information, but with more sophisticated equipment, the      photons could hold 4.17 bits, and allow for an even more      secure 25 letter alphabet.    <\/p>\n<p>      Source: University of Rochester    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.overclockersclub.com\/news\/38331\" title=\"Improving Quantum Cryptography with Twisted Light\">Improving Quantum Cryptography with Twisted Light<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Category: Science &#038; Technology Posted: March 23, 2015 06:33AM Author: Guest_Jim_* Securing communications is of great importance to many, so a system that is protected from intrusion by the laws of physics is highly desirable. Quantum cryptography is such a system and many are working on various ways to improve the methods of using it. Researchers at the University of Rochester have recently found that using twisted light can improve security even more. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-29994","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29994"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29994"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29994\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}