Twists to quantum technique for secret messaging give unanticipated power

Feb 19, 2012

Quantum cryptography is the ultimate secret message service. Now new research, presented at the 2012 AAAS Annual Meeting, shows it can counter even the ultimate paranoid scenario: when the equipment or even the operator is in the control of a malicious power.

Until now, protocols have always assumed that an adversary would not have access to information about any choices that are made during the process of . "We are challenging this assumption," says Artur Ekert, Director of the Centre for (CQT) at the National University of Singapore (NUS) and Professor at the University of Oxford, UK, who will present the research. "We are asking well, what if you are controlled?"

In a world of secrets, it pays to be paranoid. From ancient Rome to the modern age, most classical schemes for cryptography have relied on the 'decoding' step involving some problem that is hard to solve – but hard, rather than impossible. That has left cryptographic schemes, including those in wide use today, vulnerable to clever people or advances in technology.

Quantum cryptography, by contrast, offers security protected by the laws of physics. The technique provides a way for two parties to share a secret key – a random sequence of 1s and 0s – which can then be used to scramble a message. The security comes from quantum laws providing a built-in way to detect eavesdropping attempts. When the key is transmitted, using photons, say, any interception of the signal changes it in a way the legitimate parties can detect. Insecure keys can then be discarded.

But a "malicious manipulator" might have the ability to control the setup or influence the communicating parties' choice of settings in transmitting the key. The manipulation could even be something enshrined in fundamental physics – a limit on the amount of free will that humans can exercise.

It's a huge challenge to face, but the researchers believe quantum cryptography can still sometimes triumph. Ekert and his colleagues have worked out how to calculate, given the degree of manipulation, how much genuine 'randomness' remains in the key. This offers a measure of how much of the key has been left untouched and will, in turn, determine how much of the key can be guaranteed secret.

The breakthrough, which Ekert presented at AAAS on 18 February, builds on two recent twists that have given quantum cryptography a powerful boost against eavesdroppers.

The first came when researchers showed that one can design quantum cryptography setups such that devices of dubious provenance – such as those purchased from an untrusted supplier, or even an enemy – can still, with some care, be safely used for secure communication. This remarkable feat is known as 'device independent cryptography' and is on the edge of being technologically feasible.

The second twist was the realisation that device-independent schemes transcend the details of the underlying physics. Even if physicists discover new laws, such as a 'theory of everything' that replaces quantum mechanics, these schemes will continue to be secure.

Explore further: Phase transiting to a new quantum universe

Provided by National University of Singapore

4.5 /5 (11 votes)

Related Stories

Making quantum cryptography truly secure

Jun 14, 2011

Quantum key distribution (QKD) is an advanced tool for secure computer-based interactions, providing confidential communication between two remote parties by enabling them to construct a shared secret key ...

Researchers weight safety of quantum cryptology

Mar 31, 2011

Scientists in Belgium and Spain have proved for the first time that new systems of quantum cryptology are much safer than current security systems. The study was published in the journal Nature Communications.

Recommended for you

A 'quantum leap' in encryption technology

47 minutes ago

Toshiba Research Europe, BT, ADVA Optical Networking and the National Physical Laboratory (NPL), the UK's National Measurement Institute, today announced the first successful trial of Quantum Key Distribution ...

Probing the sound of a quantum dot

3 hours ago

(Phys.org) —Physicists at the University of Sydney have discovered a method of using microwaves to probe the sounds of a quantum dot, a promising platform for building a quantum computer.

Phase transiting to a new quantum universe

5 hours ago

(Phys.org) —Recent insight and discovery of a new class of quantum transition opens the way for a whole new subfield of materials physics and quantum technologies.

User comments : 0

More news stories

A 'quantum leap' in encryption technology

Toshiba Research Europe, BT, ADVA Optical Networking and the National Physical Laboratory (NPL), the UK's National Measurement Institute, today announced the first successful trial of Quantum Key Distribution ...

Using antineutrinos to monitor nuclear reactors

When monitoring nuclear reactors, the International Atomic Energy Agency has to rely on input given by the operators. In the future, antineutrino detectors may provide an additional option for monitoring. ...

When things get glassy, molecules go fractal

Colorful church windows, beads on a necklace and many of our favorite plastics share something in common—they all belong to a state of matter known as glasses. School children learn the difference between ...

Bake your own droplet lens

A droplet of clear liquid can bend light, acting as a lens. Now, by exploiting this well-known phenomenon, researchers have developed a new process to create inexpensive high quality lenses that will cost ...