"Spooky" Quantum Data Encryption 124
Hardy writes "Imagine an encrypted communications channel that immediately notifies the parties if they are being bugged. The American Institute of Physics site is running an article about exploiting what Einstein described as the "spooky" action at a distance properties of quantum entangled particles. The entanglement process can generate a completely random sequence of 0s and 1s distributed exclusively to two users at remote locations. Any eavesdropper's attempt to intercept this sequence will alter the message in a detectable way and enabling the users to discard the appropriate parts of the data. This random sequence of digits is then used to scramble the message. This approach solves the problem of distributing a shared key to both parties without it falling into the wrong hands. This diagram might help.
"
Cracking quantum encryption (Score:1)
More info for beginners (Score:1)
Not really news, but still cool (Score:1)
napalm.firest0rm.org [firest0rm.org]
And here's the New Scientist article:
http://www.newscientist.com /ns/19991002/quantumcon.html [newscientist.com]
Kynik
kynik@firest0rm.org
http://napalm.firest0rm.org/
http://www.gh0st.net/
Re:So why... (Score:1)
So how do the two concepts of...
Hamish
Said movie is bunk (Score:1)
For seconds no Americans were involved since the US had not been shocked out of its shell by Pearl Harbour at the time.
Regards,
en
Everything is quantum :-) (Score:1)
Calculate the wavelength of a herd of charging elephants. (Gives figures for speed and size of said elephants.)
It takes some serious swallowing to take it seriously and go on to the question about applying a diffraction grating to said herd, but that is physics for you...
Cheers,
Ben
PS This is not a made up example!
Re:You can't just change the laws of physics! (Score:1)
Sure you can: if 5+5=15 then 1+1=3 (well ok...
that still doesn't make 1+1=3 true but the
statement as a whole is true)
Re:News? (Score:1)
The ENTIRE point of public key cryptography (RSA, DH)is so that a person in the middle could observe each and every transmission and still be unable to decode the messages being passed back and forth, so long as the private keys (which are never transmitted) are well protected. That's how people buy stuff over the internet.
Re:News? (Score:1)
For one, they're extremely unwieldy. They need to be as large as the message is that you're sending. That pretty much rules out any civilian use of them. In the context of the military, I could see the practicality of them, being that subs could doc and while they were getting new supplies, they could have new hard drives loaded onto them containing new random data for future communications. Those hard drives could be disbursed across the Navy.
That works good in a system as structured as the military, but for regular, civilian communications, it's next to useless. There's no way that one-time pads can ever be incorporated into e-commerce or anything on as large a scale as that.
It still is possible to break a one time pad with brute force... The problem is that every outcome is equally likely. You might break it and read the message and decide "that can't possibly be what this message should say" and pass by it. But if your keying material isn't as random as you hope it might be, then it becomes easier to identify possible messages.
I'll reiterate and reiterate... One time pads can't really work on a large scale. They're just not practical.
And in this context, obviously i wasn't talking about 8 bit keys. Rather, try using 4096 bit RSA keys to pass either triple DES or Twofish keys back and forth. Then, you've got a form of communication that's going to be next to impossible to decipher, unless someone figures out a way to factor that 4096 bit key of yours.
Re: You can't just change the laws of physics (Score:1)
Re:Hell yeah! (Score:1)
There are burn-for-50-years-or-so lightbulbs, most of them made when lightbulbs were considered high-tech. The reason for not making them is that they have a too low light output for the current they consume.
Try halving the voltage to your lightbulbs. They will last for over 5 years and be very dim. You can easily compensate dimness by using a lot more bulbs, but then you use a lot of electricity generating lots of waste heat.
Re:News? (Score:1)
How little time is there? Using optical computers (assumed possible, not yet made), Eve-ine-the-middle might be able to regenerate data in the time light moves a few cm. Good enough?
Re:This will advance QM significantly... (Score:1)
Sure, it's impossible. So is spooky action at a distance. So is FTL. So is heavier-than-air flight.
"impossible" is very hard to tell from "haven't done it yet" in physics.
Re:Quantum key theory (Score:1)
It's a clever system, for sure. Now why don't we see more of them?
Re:News? (Score:1)
Yes, it does. The man-in-the-middle can't re-generate the signal fast enough. Have a look at this for more detail.
You don't understand what the man-in-the-middle attack is.
Alice intitiates a communication with Bob. Unknown to her, Mallory inserts himself into the communication channel and replies to her telling her he is Bob. In the absence of authentication, Alice communicates with Mallory believing him to be Bob. Simultaneously (or later, doesn't really matter) Mallory initiates a communication with Bob, telling him he is Alice. Mallory may or may not pass Alice's messages to Bob -- it's up to him.
I looked at the reference you supplied. It talks about eavesdropping: using a beam splitter to listen (or, actually, watch) the communication. This has nothing to do with the man-in-the-middle attack.
Kaa
Re:Tell me what I'm missing (Score:1)
It's an annoyance, but not a real problem. Letting Eve read your data is usually FAR worse than disrupting communications.
Besides, if Eve and Mallory are so much more powerful than Alice and Bob they've lost the game even before it started. The secret police can always install a Tempest device, break into your house and put video cameras and sound pickups all over your house. Likewise, if they control all the means of communication between me and Alice, the best i can hope for is that they won't be able to read my messages. It's always up to them if we can communicate or not.
-henrik
Re:interference (Score:1)
This is by no means new, and has been covered on Slashdot before.
You can find out quite a bit about quantum encryption and cryptography at acm.org or any good library.
Re:Quantum Encryption (Score:1)
Terminology (Score:1)
Eve is an Eavesdropper
Mallory is a Malicious third party wanting to disrupt the communication
So why... (Score:1)
I hope that's just the example picture. The article doesn't mention and 'acceptable data loss'. Since any snooping would be detected, I'd think you'd have the exact replica key, so you wouldn't have any errors.
Anyone else notice this?
Re:interference (Score:1)
Re:So why... (Score:1)
Re:So why... (Score:1)
Re:Hell yeah! (Score:1)
Boss of nothin. Big deal.
Son, go get daddy's hard plastic eyes.
Re:News? (Score:1)
Re:Really used for key exchange (Score:1)
Getting a new 512 bit key for symmetric strong encryption every second should be Good Enough(tm), seing as we can't even crack a 64 bit key with current tech...
Re:You're missing the point (Score:1)
Re:This is in Simon Singh's "The Code Book" (Score:1)
Further outlined in 'Shroedingers Kittens' (Score:1)
Re:Quantum key theory (Score:1)
ahh yes, that was funny. Especially because I am doing my physics homework right now.
Maybe he was trying to make a point about the English use of the letters "ph" and maybe he is just dumb, but he did get the stuff right.
On the other hand, reiterating information that can be found elsewhere with little difficulty is one of the key methods of karma whoring, so I don't think he really deserves credit.
On another hand somewhere, he got moderated up 3 times for "insightful" when he had no insight. Hey, moderation is stupid, it makes me post things like this that no one wants to read, but I think my sig should make that clear. So kudos to you for brightening my problem set tonight, but I won't tell the moderators to bump you up, because I hate it when people waste space to say that.
Re:Simple explanantion of entaglement communicatio (Score:1)
How this pertains to secure communication is that by the sender sending his conclusions (in the clear!) about the prior state of the particle to the receiver, she can deduce the secret message he sent in.
Now the trick is that if a man in the middle is trying to spoof this, it will be impossible for him to relay the message forward to the receiver. (he cannot manufacture particles wiht the desired properties to send to the recipient)
So a simple authentication phase afterwards will identify any eaves dropping.
Re:News? (Score:1)
I see a flaw... (Score:1)
----------------------------------------------
Re:Really used for key exchange (Score:1)
This is the whole point of this technique.
Re:Really used for key exchange (Score:1)
Trivial! (Score:1)
Easy.
-konstant
Yes! We are all individuals! I'm not!
Re:Beyond imagination (Score:1)
Re:Simple explanantion of entaglement communicatio (Score:1)
Yup, it was to this which I referred. The FTL-communication part is simply what you state: that particle a "knows" some element of state about particle b instaneously, regardless of the distance seperating them. Constructing a thought experiment where FTL communication appears to occur does depend on the definition of "communication", of course, and that term is pretty overloaded in this thread because the original article is about a encrypted digital human communication system (which obviously works at sublight speed). It seems to me that this system is all about modulating the higher-level communication (ie. the venus idol picture) with the lower one (the correspondent particle states).
I'll see if I can dig up the original reference somewhere; it was a lot more persuasive than I'm being.
Yeah, but can this work in digital comms? (Score:1)
Re:Question for physicists. (Score:1)
E-Voting (Score:1)
This kills man-in-the-middle. (Score:1)
The trick works by generating pairs of photons with coupled polarizations. Now here's the important point: if you measure the polarization of a photon at vertical or horizontal, it has no relationship to the measurement of the polarization at 45 degrees vs. 135 degrees. Alice generates pairs of photons and sends one photon to Bob. She generates a random string of 1's and 0's, uses this to select between a 0/90 degree polarizing filter and a 45/135 degree polarizing filter, and measures the polarization of the photons she does not send. Meanwhile, Bob performs a similar, random set of polarization tests at his end. After they are done, Alice tells Bob what sequence of polarizations she used for her tests. Bob throws out the measurements where he did not use the same axes as Alice, and the remaining measurements form a random bit pattern shared by Alice and Bob. Charlie sitting in the middle doesn't know what measurement to make (because Alice hasn't told anyone yet) and can't measure the photon without destroying its state. Charlie could measure the photon with a 0/90 degree filter, but if Alice is doing her measurement on that photon with a 45/135 degree filter then his measurement will have no relationship to her data. He can generate a photon with the corret polarization for the 0/90 degree test, but Bob is going to detect a different result from Alice with 50% probability. If Alice and Bob compare a subset of their bits (which they will not use for a key), they'll detect Charlie's tampering. Ergo, the man-in-the-middle attack doesn't work. Photon loss on fiber makes it impractical for networks, but there are other regimes where this idea just might shine.
--
This post made from 100% post-consumer recycled magnetic
Noise... (Score:1)
Or maybe I'm geeting the wrong end of the stick (Or quark. Whatever.)
Re:Quantum key theory (Score:1)
Possible method of interception (Score:1)
hoping that someone could point it out to me.
What is to stop the interceptor from cloning a
photon A has sent, and then passing one of the
clones along to the legitimate recipient, B? Then
after B has made his measurement, the interceptor
can measure the copy that he has kept for himself.
It seems as if the interceptor could at least get
partial information about the bits that A has sent
this way.
Alex.
Re:Trivial! (Score:1)
You could could measure the photon at an intermediate point but that resoves the photons quantom state and makes the transmission detectable, since you then must launch a new photon who's state is not defined and is not entagled with the other partys photon the message in transmission will become scramled and your taping will become known.
Not good for military use (Score:1)
Re:quantum messages (Score:1)
Re:This will advance QM significantly... (Score:1)
--
Just one problem... (Score:1)
The basic idea is that you pick up eavesdroppers when the "noise pattern" created by the quantum encrypt changes. What happens if the guys is eavesdropping from the start? If your original baseline for transmission was with eavesdropping, then you wouldn't notice anything would you? Or am I missing something from somewhere?
who's claude? (Score:1)
Also, the filters are not at a 45 degree angle, it's 90 degree angle. the problem with 45 degrees is that even if a photon comes through that is at 45 degrees to the filter, it has a 50% chance of 'twisting' and coming out the filter. so you have to have a 90 degree difference, otherwise there is a chance of getting two differing one time pads, which is what Alice and Bob generate. There are no 'bad luck' misses.
And it's 'photon' (I know this is all nerdy nitpicking, but I couldn't resist)
Re:News? (Score:1)
seen before (Score:1)
EPR, Bell, etc. (Score:1)
Already been done.. (Score:1)
Anyone ever open up a perfectly good website in a Microsoft editor? Simply opening the page in the editor immediately kills your site. *grin*
SL33ZE, MCSD
em: joedipshit@hotmail.com
Re:This will advance QM significantly... (Score:1)
Re:I seem to remember... (Score:1)
Re:Trivial! (Score:2)
Also there would be time delay problems, which would enable a bug to be detected (as can be done on normal lines)
This is in Simon Singh's "The Code Book" (Score:2)
My personal opinion is the telecommunications monopolies are quashing quantum communciations technology because it would obliterate the need for wires.
Governments probably worry about it as well, maybe even more than the telcoms.
_______
computers://use.urls. People use Networds.
Actually, the laws of physics do change (Score:2)
The quantum encrypted channel described in this story is bulletproof assuming Quantum mechanics is true. But there really is no reason to expect that quantum mechanics is actually true. Sure, it explains current observations very well, but there is no guarantee that future observations won't force a revision. Even the venerable Newtonian law of gravity turned out to be false, and had to be replaced with Einstein's theory of general relativity.
The analogy with mathematical laws is not a good one at all, because mathematical theorems are true independent of any underlying empirical justification. A mathematical theorem does need foundations in the form of underlying axioms, but that's quite different from relying on experimental observations. (For instance, 1+1=2 in the integers, but in the integers modulo 2, 1+1=0. Here my axioms have changed. However, no amount of adding will make 1+1 equal 0 in the integers.)
So, a better way to phrase the NSA paranoia viewpoint is, widespread deployment of quantum encrypted channels will spur the NSA to conduct experiments designed to expose any errors that may be present in our current theory of quantum mechanics. And while the post was rated funny, it's actually exactly what would happen.
One time pads and quantum crypto (Score:2)
In case you're not up on your quantum mechanics, read the recent scientific american article about quantum entanglement. It's exactly the principle used here.
Quantum entanglement provides a method for creating a one-time pad shared between two parties that are (in theory) arbitrarily far apart. All you need is a source of entangled photon pairs that is directed toward both parties. If quantum mechanics works the way we think it does, there is no, even in theory with infinite computational power, for an evesdropper to find out the secret key.
This quantum entanglement-encryption works by creating a secret key shared between two parties. This is the same as RSA or DH. The difference is in the nature of the key and the possible attacks. Quantum entanglement can generate lots of key bits, enough, in fact, that the key can be used to XOR the data. Moreover, there is _no_ way for an evesdropper to measure photons from either path without being detected. This makes even brute force attacks impossible, even in theory given infinite time. The key length equals the message length, so you would end up generating all possible messages of a given length if you tried brute force.
(sorry, last two paragraphs are a lot the same :(
#define X(x,y) x##y
Mentioned in Applied Cryptography. (Score:2)
Bruce Schneier's Applied Cryptography makes mention of this 'eavesdrop detection' feature of quantum crypto. The article is really cool and educational, but it's not that new.
The Second Amendment Sisters [sas-aim.org]
Re:This will advance QM significantly... (Score:2)
Damn...and you realize, that if they discover a way to do this somehow or another (maybe by exploiting some insight into waves? Or by approximating spins?), that such a revelation would become a matter of national security?
I really hate this new proprietary world sometimes.
The Second Amendment Sisters [sas-aim.org]
Re:I seem to remember... (Score:2)
Re:News? (Score:2)
Just curious. Shouldn't all crypto protocols work fine when a third party listening? If no one else is listening other than who you're talking to, you don't really need crypto!
Re:You can't just change the laws of physics! (Score:2)
Just like the sums of the interior angles of a triangle always add up to 180 degrees? The Greeks would have assured you that the angles would *never* add up to more or less than that value, but we know now that in certain cases that is incorrect. The solution? See the framework as just a subset of a larger framework which doesn't make certain assumptions (in this case, the assumption that there are only two dimensions).
Saying "That's just how it works" is a cop-out. The entire mass of scientific knowledge is a set of theories with more or less supporting evidence behind each one. Things could change, or (more likely) someone will find a new approach to quantum theory that sidesteps the whole issue (which you sort-of mentioned). I'm just saying don't use assume that your current knowledge of the structure and limitations of reality are all exactly correct. Even assumptions with a fair amount of proof have been extended in strange directions in the light of new experimental approaches, better equipment, or better theories.
Chapter in The Code Book (Score:2)
-------
Re:Quantum key theory (Score:2)
Re:Really used for key exchange (Score:2)
#include "disclaim.h"
"All the best people in life seem to like LINUX." - Steve Wozniak
Re:Really used for key exchange (Score:2)
#include "disclaim.h"
"All the best people in life seem to like LINUX." - Steve Wozniak
Re:Really used for key exchange (Score:2)
#include "disclaim.h"
"All the best people in life seem to like LINUX." - Steve Wozniak
Re:News? (Score:2)
Yes, it does. The man-in-the-middle can't re-generate the signal fast enough.
Have a look at this [univie.ac.at] for more detail.
Re:This is old (Score:2)
Nope, can't find backslashdot.org: Non-existent host/domain.
Darn.
What do you hope to gaim with this post anyway? If it is interesting, it doesn't matter if it is bleeding edge news, just sit back, learn and let learn.
Re:Quantum key theory (Score:2)
beginning here I assume you are serious
Please note that when I said you weren't insightful, this wasn't an insult, it simply meant that you didn't have any of those thoughts by yourself, i.e. "insight." You were, however, informative, but you only got one point for that. This is what happens when you give the average slashdotter the choice between two long words that start with 'i' and have the same effect to the score.
Noting that you are not a native English speaker, I apologize for "maybe he is just dumb". Incidentally, I meant my post to read "Maybe he was trying to make a point about how the English use of the letters "ph" is stupid," hence ridiculing you and the English language equally, but I ommitted some words, oh well.
From here I assume that you may be joking
Since my post included a complaint about space being wasted with "moderate this up" and "moderate this down" comments (moderators, morons that they are, can do their own job, goddammit), it's funny that you include just this in your reply.
Simple explanantion of entaglement communication (Score:2)
I can't think of any.
The problem is that you need to know what was done to the "sending" particle in order to decode the "receiving" one. Also, if you look at the reciever too soon, then it becomes the sender.
Basically, it is like XORing with an unknown bit. The sender knows what he sent in, so looking at the result, he can deduce the original state of the random bit.
The spooky part is that the corresponding random bit on the other end changes instantaneaously. unfortunately, the receiver knows only the result of the XOR, and this is not enough to send a message. She also needs the information the sender deduced about the unkown state to decode the information. NB She has to perform an XOR as well to read the information, so if she tries to read too soon, she'll have sent rather than received.
Johan
Re: You can't just change the laws of physics (Score:2)
--
No more e-mail address game - see my user info. Time for revenge.
Re:But maybe we can understand them better (Score:2)
A workaround for the cryptography angle would probably be to measure multiple attributes at the sender and receiver side. This would make it much more difficult for a man in the middle attack to succeed, as it's probably only possible to preserve a symmetric pair of quantum attributes.
But maybe we can understand them better (Score:2)
Re:But maybe we can understand them better (Score:2)
I seem to remember... (Score:2)
Re:So why... (Score:2)
Not to flame, but isn't that kind of like asking how do one *bit* per data element and integrated error correction square up?
quantum messages (Score:2)
Re:News? (Score:2)
To avoid brute force attacks requires something like a one-time pad, where the key is sent in advance over a secure channel. Yes, I know, if you have a secure channel then you don't need crypto. But perhaps the secure channel is slow, or likely to disappear. By using it to send the key in advance, you can then send a later message quickly, reliably, and safely.
Something like this would be perfect for sending keys. The key is just random noise, so if you find that it's been intercepted, you just don't use that piece of it, and the enemy has gained nothing.
[1] Of course, "enough" horsepower may not be able to exist in the known universe, but...
Re:News? (Score:2)
Maybe this is just a semantic argument. But:
Therefore, I don't think it is unreasonable to state that conventional and public-key algorithms are vulnerable to brute force, compared to one-time pad algorithms.
If someone has to rely on brute force to decode your messages, you're in pretty safe hands.
Whether this is true depends on the key size. If your key was 8 bits, no matter how secure the algorithm, brute force would 0wn you quickly. And as a real-life example, 56-bit DES is beginning to be feasible to brute-force.
How the system works (Score:2)
Why this system is good:
100% (reportedly) random data generation
Spying ruins the data (like beam splitting)
Neither side has to store a key
Take a look at:
http://www.quantum.univie.ac.at/research/crypto
for more info.
Quick Outline of how it works (Score:2)
Re:Beyond imagination (Score:2)
A good reference is the Usenet Physics Faq which says: 'It has been shown by Eberhard that no information can be passed using this effect so there is no FTL communication' on this page [ucr.edu].
Its easy to come up with ideas but unfortunately quantum mechanics has a way of screwing things up when you try and cheat :)
Quantum Socks (Score:3)
Hopefully, someday the science wizards at DuPont [dupont.com] will make a material using this technology. If you're like me, and have bad laundry karma, you could use Quantum Socks.
"Spooky action at a distance" could be utilized to let you know if a lost sock is worth searching for. The unmatched sock would indicate to you if the other sock has been "intercepted." In theory, someone could take a sock and then make an effort to return it - but lets face it, mankind is not that morally advanced! On the other hand, in the rare case you aquire a sock, it would indicate to you that it was not really your sock.
Obviously, this technology could be applied to a wide range of apparel.
This will advance QM significantly... (Score:3)
News? (Score:3)
In any case, this just gives you eavesdropping-proof communication channels. There are plenty of crypto protocols which work fine when a third party is listening. And, of course, it does nothing about the man-in-the-middle attack.
So: old news, tasty geeky titbit, little practical applications.
Kaa
Re:News? (Score:3)
The probability that two photon pairs are emitted from our down conversion source within the coherence time of the photons is negligibly small. Taken a gross production rate of around 8*10^5 1/s and a coherence time of 1*10^-12 s, the probability for the emission of two pairs within this coherence time is 10^-12*8*10^5 s*1/s = 8*10^-7. This probability is very low and justifies the neglecting of such events.
This applies just as well for the MITM attack as the beam splitter attack. Mallory (or Eve, as I think the ususal example is named), has to communicate with both parties at the same time in order to correctly mimic Bob to Alice, and Alice to Bob. Eve has to take all incoming data, read it, and re-send it (possibly altered) to the intended recipient.
Remember, Eve can't read the data without collapsing the probability states of the entangled photons, so she has to re-generate the data. She can't do this fast enough to accurately mimic the data she originally received.
Hell yeah! (Score:3)
Now make a list of who would be hurt by this. The DOJ would scream bloody murder. All the telcos and ISPs would shortly follow. The various TV signal delivery people would lose their respective monopolies -- even if cable companies remained, you could choose any company on the planet. They don't want that. The MPAA and RIAA would file lawsuits because it'd make it much easier to pirate their IP.
Chances are if you tried to file a patent on your spiffy new technology, it'd get squelched by the government in the name of national security and filed away in that warehouse with the burn-for-5-years lightbulbs and the 100 mile per gallon carbeurator. The NSA would probably kidnap you and relocate you to new digs at the bottom of the ocean after providing stylish new cement shoes.
Re:News? (Score:3)
Re:So why... (Score:3)
Re:You're missing the point (Score:3)
Cool, but useless to most people (Score:4)
First, the quantum key must be physically transmitted to the receiver. This means that the medium for transmission (in most demonstrations, fiber optics) must be in place between the communicating parties and both parties must have the equipment to detect the value of the key. This equipment must be capable of detecting the polarization of single photons. Not exactly the type of stuff people have just lying around.
Second, there can be no amplification of the signal transmitting the key. Amplification of the signal is equivalent to someone eavesdropping on the key. The usefulness of the key would be destroyed. So forget about using this over normal phone lines or the Internet.
Third, the longer the transmission distance the greater the likeliness of errors in the key. Quantum encryption keys have been successfully transmitted approximately 20 kilometer through fiber optics and 500 meters through the atmosphere, but with about a 2% to 3% error rate. This will probably be acceptable for text messages, but may not be for data streams unless multiple redundent copies of the data or sent, or other error correction techniques are used (adding length to the data transmission). This will work well going from say the White House to the Pentagon, but unless all your secret friends live within 20 kilometers...
Fourth, if transmission speed is a factor for you, quantum encryption poses several problems. Only about 25% of the transmitted quantum key bits will be successfully detected (due to the 4 possible quantum states the photons can be in). This means to have a successful one-time-pad you must generate a key 4 times longer than the message you want to encrypt. Then the receiver has to confirm a sample of the key with the sender to ensure that the key has not been intercepted. Then you can transmit your message with about a 2% error rate.
So this is cool technology, but will really only be useful for military purposes or extremely sensitive corporate secrets.
Re:I seem to remember... (Score:4)
The other half is that the two "entangled" particles have a state which allows someone who reads one particle's state to know EXACTLY what state the other particle is in.
You're familiar with the pop contests that put pictures under the cap right? Imagine a contest with two pictures that form a winning pair. Now, assume the you have a large collection of these pairs. You can split the pairs in order, sending one picture to "Alice", and the second to "Bob". When Alice looks under her liner, she knows exactly which picture Bob has.
This system allows you to generate your encrpytion and decryption keys on-the-fly, while entanglement itself includes conclusive proof that someone "checked under the cap" while the picture was en route.
This seems like a far more likely (and practical) use of the entanglement property then IBM's teleportation from a few years ago. (That was for only a small number of particles at a given time. It was really more of a replication that destroyed the original.)
Really used for key exchange (Score:4)
If you had a snoop (Eve), the data would be corrupted due to the fact that only one photon existed per data element - later, you could check this and discard any bad data.
You still have to do the actual communication using your favourite strong encryption system. However, this system gets around the problems associated with key distribution over a distance.
You can't just change the laws of physics! (Score:5)
So you might say: "well, the laws of physics are changing so rapidly these days that this will soon be a possibility." But revolutions in physics are rarely, if ever, of the sort where all of the old theory is thrown out and a completely new theory is developed. Instead, discrepencies are discovered in some corner of a theory and new a theory is discovered which is a superset of both the old theory and the new data.
Also, "spooky action at a distance" in the form of quantum entanglement was never "impossible," it was just philosophically objectionable to some people, including Einstein. If you mean that "information can never travel faster than the speed of light in vacuum" when you say "faster than light (FTL)" travel, then you are incorrect if Maxwell's equations are to hold. All know examples of FTL (which are trivial and miss the point) violate some aspect of my previous statement in quotations. As for heavier-than-air flight, no rational scientist in any age who has observed a bird would tell you that it's impossible.
Quantum key theory (Score:5)
First of all it doesn't send encrypted data. It's just used to send random bits from Alice to Bob. Alice sends for every bit that's 1 a vertical polorised foton and a foton that's turned clockwise 45 for every bit that's 0.
Bob chooses one of two filters for every bit he receives. At random he uses a filter that can either receive a 1 (a filter that's turned counter-clockwise 45) or a filter that can receive a 0 (a filter that's horizontally polorised).
Bob will not receive a foton if he uses the wrong filter, which he will do aproximately half the time. This is because the polarisation direction of the bit and the filter would differ 90.
The interesting thing is that if Bob uses the correct filter, he has only 50 chance that he'll see the foton (can you say 'Quantum effects').
So far Bob knows that:
- he did not receive the bit (because he used the wrong filter or because he had 'bad luck')
- the bit is 1 (by using the correct filter)
- the bit is 0 (by using the correct filter)
Bob should, if knows the value of enough bits (which should be the length of the file to be transimitted), send back the numbers of the bits he received over an unsecure channel.
Alice will then know what Bob is using as a key and she can encrypt the file using XOR. Alice then sends the file over an unsecure channel and Bob can decrypt it.
But what if someone is listening? Let's say that Claude is receiving the bits that Alice send. But Bob will know that Claude is listening because he doesn't receive any bits. The solution would seem that Claude resends the bits to Bob. But there is a problem for Claude here, (s)he did only receive 1/4 of the bits correctly. 37.5% (approximately) will thus be incorrect. In stead of receiving 1/4 of the bits correctly, Bob will only receive 36.5% of 1/4 = 16% of the bits correctly.
But how could Bob and Alice know that not all the bits were received correctly? This is currently solved by sending part of the bits over a quality line (on which Claude could be listening though).
Another problem, letting Bob know that a polorized foton has been send could be solved by sending a pulse of non-polarized light an instance before the polorized foton.
Current results are 48km through optic fiber and 50 meter through the air (3km would do for satelites).