Quantum Cryptography: 100km Barrier Broken 194
jdfox writes "Toshiba Research Europe have just demonstrated quantum crypto over 100km fibre links. Sounds like there's still a fair bit of work to be done before it leaves the lab, but it's amazing that they've got as far as they have. There's another article about it, though still not much technical detail, here on the BBC and here on The Register."
That's a big lab! (Score:5, Funny)
That must be a big lab! Or maybe they had 100km of fibre and they just looped it round and round and round.
Re:That's a big lab! (Score:3, Informative)
Re:That's a big lab! (Score:5, Informative)
> and they just looped it round and round and round.
Fiber without the colored "protective insulation" takes up surprisingly little space, and weighs next to nothing. 100km of fiber could be picked up by with one hand if mounted on single spool.
In our lab, we have four fiber spools (two 20km and two 40km) that can be connected together to create various distances. Each is mounted in a plastic case that is about a foot in diameter and 4 inches wide.
Re:That's a big lab! (Score:2)
Needless to say I got a little dizzy.
What is so good about it.. (Score:5, Informative)
The sender and recipient each have a key to decode the photon stream, but any attempt to hack into the link and capture the key is doomed to failure as it alters the quantum state of the intercepted photons. These changes are easily detectable, revealing the presence of the hacker.
article (Score:2, Informative)
UK researchers have broken the distance record for quantum cryptography, the optical technique that enables âunhackableâ(TM) communication along an optical fiber.
Andrew Shields and colleagues from Toshiba Research Europe, UK, revealed their record-breaking link, which reaches over 100 km, at the Conference on Lasers and Electro-Optics (CLEO) in Baltimore, US.
âoeAs far as we are aware, this is t
Sounds like the press hasn't thought this through (Score:1, Troll)
If the sender is capable of generating photons with an arbitrary quantum state, so is the hacker. Obviously this will block attempt to merely split the signal, but why not just observe and then retransmit new photons with the original state?
I'm sure it's just an oversimplification by people who don't know what the researchers where talking about...why does this help anything?
Re:Sounds like the press hasn't thought this throu (Score:4, Informative)
a|0> + b|1>,
where |0> and |1> are vectors, and a and b are complex numbers, and the total vector has a magnitude of 1. When we measure the state, it collapses into the |0> vector with probability |a|^2 and into the |1> vector with probability |b|^2. And of course |a|^2 + |b|^2 = 1.
So the hacker won't know what the arbitrary quantum state was. Observing the photon destroys the original state.
Re:Sounds like the press hasn't thought this throu (Score:1)
Re:Sounds like the press hasn't thought this throu (Score:4, Interesting)
The idea is that you can measure the photons with only partial accuracy, and according to the setting of the measuring instrument. For example, if sending a photon in state Y, the measurement does not yield: "The photon was in state Y", but instead "The photon was probably in state X but maybe in state Y or Z, and not in state W.". Another measurement configuration could yield: "The photon was probably in state Y but maybe in state X or W, and not in state Z."
The "hacker" does not know the measurement configuration at the receiver and may try some arbitrary configuration of his own.
The problem is, when receiving the measurement result, for example that the photon was probably in state X, trying to retransmit it as X may be picked up as inconsistent at the real receiver's.
The measurement configuration itself for each bit can be agreed upon by a negotiation stage where a bitstream is sent accross random configurations of both the sender and receiver and then publically agreeing which bits of the sequence to use (knowing they have matching configurations, not letting a "hacker" enough information to know what configurations those are - leaving him with impossible guesswork).
Re:Sounds like the press hasn't thought this throu (Score:2)
The sent bit is polarized as either vertical(1)/horizontal(0) or the two diagonals as 1/0 in a same way. If you try to measure weather it's vertical/horizontal, but the sent bit was one of the diagonal polarities you get randomly 1 or 0. And naturally if you try to measure the correct polarities you get the intended bit 1 or 0.
The receiver can measure the polarity in of those two different ways. Upon receiving he picks the polarity measurement of cho
Re:Sounds like the press hasn't thought this throu (Score:4, Insightful)
I have another interesting question though.. Would it be possible to combine this with the "laser teleportation" technology demonstrated earlier this year to have a REALLY secure wireless link? If so, 30 years from now, all communications might be so secure that we wouldn't have to worry about eavesdroppers.
Re:Sounds like the press hasn't thought this throu (Score:2, Interesting)
Nope. I mean, it wouldn't be so expensive today to encrypt point-to-point links with a stream cipher. But the problem is, it has to go through a router at some point. And you just have to put a bug in the router, have it copying traffic... this stuff is multi-stage, there's no way you could tell if the router were hacked/bugged from the timing.
I think if you're going to fantasize about a f
Re:What is so good about it.. (Score:2)
Sure, perhaps I could send some sort of ping down the line to determine if anybody is watching before I start transmitting. But how do I know if they join at an arbitrary point in my transmission?
Re:What is so good about it.. (Score:2)
Re:What is so good about it.. (Score:1)
Re:What is so good about it.. (Score:3, Interesting)
What you can do to prevent this is the following:
1. select a random key
2. transmit the random key to your partner
3. check if the transmission has been tapped by an attacker. if yes, go back to 1.
4. encrypt all following data with the key (which is not known to the attacker)
The transmission is as secure as the weakest of the following items:
- encryption algorithm
- random key selection process
- "check if tapped" procedure (
Re:What is so good about it.. (Score:1)
But surely you'd only go to this effort for something really secure?
Which means a DOS attack of trying to listen in, distrupting the schemes is a good thing to do?
And of course if your cable is 100KM long you've got literally hundreds of locations to hack/check for breaches?
assumptions (Score:5, Insightful)
From the Register article:
Dosent quantum cryptography depend on the assumption that it is impossible to copy this stream of encoded photons without leaving a trace?
Re:assumptions (Score:1)
Re:assumptions (Score:4, Insightful)
Hmm, physical laws are actually not facts...
They are more best explanations for which no counterevidence exists yet or explanations that describe the problem as good as needed
Re:assumptions (Score:2)
They are more best explanations for which no counterevidence exists yet or explanations that describe the problem as good as needed
That can be called a), but you really shouldn't forget
b) they give predictions that can be measured
For any scientific theory it's equally essential that it both explains and predicts. Otherwise we wind up into the domain of undisputable explanations, e.g. "it was God's will".
Perhaps you refered to that as best explanation, but
Re:assumptions (Score:5, Interesting)
Yes. However, quantum mechanics is an extremely well-established theory.
As a physicist, I'm reluctant to call anything a fact. However, just because I cannot prove that (say) gravity won't cease to exist tomorrow morning, doesn't mean I live under the constant fear that this might in fact happen. Much in the same way, I'm confident that nothing is wrong with quantum mechanics.
well (Score:3, Interesting)
Re:well (Score:4, Informative)
Newtonian mechanics is still correct - in the limit of small velocities (compared to the speed of light). Relativity hasn't invalidated Newtonian mechanics, but shown that it (Newtonian mechanics) is a special case in a more general theory.
I don't assume that quantum mechanics is the ultimate theory; in fact, it isn't today (think quantum field theories). But I do assume that any (existing or future) theory cannot contradict quantum mechanics, but must contain it as a special case.
Newtonian mechanics isn't correct (Score:2)
Re:assumptions (Score:2)
"Ah! Quilebrium physics. An atom state is indeterminate until measured by an outside observer."
"We call it quantum physics. You know the theory?"
"Yeah, I've studied it... it among other misconceptions of elementary science."
(bonus points to the first person to name the reference)
Re:assumptions (Score:2, Interesting)
So called "noisy-cloning" techniques exist, but they would be detectable in any decent quantum-crypto technique. I imagine the only way you could intercept the signal is to find a heretofore unknown theory that supersedes QM somehow (which the brightest minds have be
Re:assumptions (Score:1)
Yes; but this is a provable consequence of the laws of quantum mechanics. It's known as the no cloning theorem [wikipedia.org].
Terry
Re:assumptions (Score:2)
Re:assumptions (Score:3, Interesting)
Bluewonder did a good job of explaining how reliable the physics is, but any security geek will look for ways to change the problem to one where the theory doesn't apply any more.
I once had the privilege of attending a talk by Shamir in which he mentioned in passing a detectable but terribly simple attack on quantum key exchange. Mallory simply shines a bright light pulse backwards onto the transmitter.
sounds like it did leave the lab (Score:1, Flamebait)
Bleh, sorry for the lame joke, I'm drunk.
flamebait? (Score:2)
put in a repeater (Score:2, Interesting)
Re:put in a repeater (Score:4, Interesting)
But without pretty spiffy splicing techniques, how long do you think it would take to get that repeater inserted into a fibre link? When I was in college, a friend of mine got a job fusing splices in fibre optic lines with a special machine, and it still took him several minutes per splice once he got good with it. The other end is going to know something's up when the fibre goes dark for more than a few ms...
Re:put in a repeater (Score:5, Informative)
Re:put in a repeater (Score:1)
Re:put in a repeater (Score:1)
I'm not sure you read the article, but the eavesdropper CAN read the message. The thing is that while he 'checks' the photons, he change their state.
Let's compare it with logical circuits:
In a logic circuit, the area somewhere between 0.0 V and 0,9 V (depends on what circuit, actually) is defined as a logical zero... The area above 1.5 V is positive (assuming 5 V circuits, voltage above 5 V might burn it out)... So,
Re:put in a repeater (Score:2)
Re:put in a repeater (Score:2)
Further
Re:put in a repeater (Score:5, Informative)
Think about it - if this were possible, an unwanted listener on the line could sample the stream, and then generate two streams - one back along the line, and one into his own recorder. Since quantum communication apparently makes this impossible, the answer should be no, whether or not my understanding of the situation is exactly correct.
Re:put in a repeater (Score:4, Informative)
When A & B communicate A first sends the stream of photons using two types of polarisation (typically horizontal/vertical-linear and left/right-circular), and B measures randomly in the two different schemes. When the polarisation is measured in the wrong scheme the outcome is random.
The trick is that A & B now communicate over an insecure circuit and agree to throw away data where B was using the wrong scheme. They now have a clean stream of bits to use as a one time key over their insecure circuit.
Re:put in a repeater (Score:3, Interesting)
Slashdot doesn't allow me to post the maths, but I'm sure you can google for it.
Re:put in a repeater (Score:3, Informative)
> in use, and she can't validate her scheme with the sender, so her data's useless.
The point is that, after the data has been transmitted to B, B will announce
"I have read bit 0 with method #2, bit 1 with method #2, bit 2 with method #1" etc.
A then knows what information B has. The attacker E doesn't. She knows only
those bits where she (luckily) read the bits with the same method as B.
Statistically, she knows only 50% o
wouldn't this allow for interception? (Score:2)
Consider this scenario:
A --> B is intercepted by E, who responds to A (and thus gets 100% of the information). There is now essentially an A E connection, but A things he's talking to B. E then sets up a connection to B, pretending to be A, and retransmits the data.
It seems to avoid this requires some sort of host-identity verification mechanism.
Re:wouldn't this allow for interception? (Score:2)
Now, this is of course an authentication problem, and can only be solved by having either secret shared knowledge, public key authentification, or (nearly) unreproducable characteristics (like, knowing how somebody looks, if you meet him in person).
One way would be to have a classical one-time pad
don't think about it... (Score:1)
+1 cent.
Re:put in a repeater (Score:5, Informative)
You can't.
The sender assigns two bits of information to each photon. However, you can only
measure one. This is similar to the Heisenbarg relation of uncertainity, where
you can EITHER measure the position OR the impulse of an electron.
The sender generates a long stream of random information. The receiver reads
in either way, according to (other) random. An attacker would not know in which
way the receiver has read the information. However, if the attacker has read
the photons himself, he has destroyed every other bit. Thus, about 50% of the
bits that the receiver gets, are wrong. This is easy to detect.
As a result, you can't passively tap such a communication line. The only thing
you can do, is to impersonate the receiver, so that the sender communicates
(untapped) with the attacker. The attacker could then establish a second (also
untapped) channel to the original receiver, and relay all data back and forth
on the logical level.
This is called a man-in-the-middle attack, and works for many crypto systems,
not just quantum.
There are crypto protocols that try to prohibit this attack. PGP for example
relies on the "web of trust" with signed public keys. HTTPS/SSL uses CA's
who sign certificates.
The quantum communication channel does not solve this problem. It solves another
problem: it enforces that the channel can not be tapped without being noticed.
Marc
It Still Isn't Out of the Lab? (Score:3, Funny)
Toshiba Research Europe have just demonstrated quantum crypto over 100km fibre links. Sounds like there's still a fair bit of work to be done before it leaves the lab...
How could it not have left the lab? Is Toshiba's lab 100KM long? That's a pretty huge lab!
Re:It Still Isn't Out of the Lab? (Score:2)
Awesome! (Score:4, Funny)
a bit unprecise ... (Score:5, Informative)
Actually it is not completely true, you cannot guarantee that you send out a single photon. Indeed, you don't. You try to approximate a single photon source by using weak laser pulses, but this does not mean you always send out a single photon (sometimes you send out more, sometimes you do not send out any at all). But every security proof consider the fact that you are able to send single photons (which is highly not trivial)
Actually this fact makes most implementations of quantum crypto protocols insecure to a class of attacks (PNS), even though they would take place in a very unrealistic framework (but you have to consider them).
An important note (Score:3, Interesting)
RLE lab at MIT (Score:1)
The US Gov is going to LOOOVE this! (Score:2, Insightful)
This is great news for privacy. Sure, if Scully and Mulder want your box, they put a camera in your house, sniff the keyboard for the pw, or just take it via a warrent issued from a Judge who stamps his approval on anything that involves encryption and terrorism.
Overall, great for privacy. I sure as hell want Citibank using this on all their ATMs, Visa on
Re:The US Gov is going to LOOOVE this! (Score:2)
Re:The US Gov is going to LOOOVE this! (Score:2)
Re:The US Gov is going to LOOOVE this! (Score:2)
Re:The US Gov is going to LOOOVE this! (Score:4, Insightful)
Where it may have helped is over something like the internet... if an 'unhackable' transport method could be developed, privacy would greatly be benefitted. But as the internet inherently requires data streams to be intercepted and forwarded, usually many times over, this method will do nothing to help regular privacy.
Better than a bank (Score:2)
Sometimes they might not want the feds knowing absolutely everything.
Is there a law against that?
_______________________________
The Spiders are coming [e-sheep.com]
Re:Better than a bank (Score:2)
Bank Usage (Score:1)
I don't think this will help banks very much.
It just gives Slammer/Bugbear/etc. a faster and cooler (but not at the same time) means of propagation.
interceptable, but interception always detectable? (Score:2, Interesting)
The key point here is that by observing them, the person in the middle changes their quantum state, thus making it immediately obvious to the intended receiver that the channel is insecure. So depending on the delay between the receiver determining this, and indicating to the sender to halt transmission, someone could still capture at least some da
Re:interceptable, but interception always detectab (Score:5, Informative)
Re:interceptable, but interception always detectab (Score:1)
If I'm understanding this correctly, it sounds like it could be very useful already today for the network or data link layer in secure networks, but not really feasib
fabric of reality (Score:5, Interesting)
you can even buy this ... (Score:2, Informative)
Realistic deployment of this? (Score:1)
What would need more than conventional encryption with huge keys at the moment?
Note that I stress "currently". Its pretty clear that a good ways down the road either computers will brute force 2048 bit keys in a few seconds or a way to factor huge primes will come along.
Question (Score:1)
Simple... (Score:3, Informative)
Key Distribution (Score:5, Informative)
A clarification on Quantum Cryptology being secure (Score:1)
Re:A clarification on Quantum Cryptology being sec (Score:1, Informative)
The problem is, the name Quantum Cryptography is misleading. Actually, this is a key agreement.
Suppose Alice and Bob wants to share a common secret key. To do this, they have to agree on some common shared bits. If qubits are stolen, then Bob does not receive a them, so this does not bring any problems (because they both see the qubits have been stolen, they simply do not use them to generate the key). As long as they have more correct bits than the e
so what if you can't read it unnoticed (Score:1)
On a different note: do the photons change state just before you intercept/read them, while you're reading them or after you've finished reading them? I would assume the latter, otherwise the recipient also won't
Misunderstood (Score:2)
As for when they change state, they change state when you are observing them (say, when they hit a detector). An observer in this case is no different than the desired recipient.... it's just that once you receive it, you canno
No use for anything real (Score:2, Insightful)
And encrypting each hop from me to my friend seems to hardly help at all. Now instead of the evesdropper being able to put a probe on any of the wires, they have to break into one of the routers. But really, who ever heard of someone stealing credit card numbers by digging up cab
Re:No use for anything real (Score:1)
"Sir, I can't hold up this hack for long! I'm starting to loose quantum state! The photon stream is disrupting!
More seriously... At least it removes the snooping factor that plagues some authentication schemes.
--
jpa
ummmm (Score:1)
thanks in advance to anyone who can explain this for us pea brains
slashdo
Re:ummmm (Score:2)
Re:ummmm (Score:2)
the message that they sent was: (Score:3, Funny)
Can someone explain to me... (Score:1)
Location A has a proton that is spinning in one direction while Location B has another proton from the same atom which is also spinning in the same exact direction at the same speed as the result of some sort of natural phenomenon.
When one location shoots the proton with a beam of some sort to make it spin in the other direction at a different speed the proton at the second location starts to do exactly what the proton at the first location was doing th
Re:Can someone explain to me... (Score:2)
Quantum cryptography uses the idea that each proton is a bit of data. If someone was to read that proton, they would be removing the proton, and cause a problem in the transmission. If someone read that proton and tried to copy it, there would be a relatively large latency in the transmission. Etc.
If I remember correctly the type of quantum behavior that you are describing wasn't a
A basic question about quantum computing (Score:1)
This brings up the question (Score:3, Interesting)
Or is this just the first time someone bothered to try this over the distance in question.
Pet peeve of mine (Score:2)
Nice round numbers that are powers of ten are not "barriers".
Concept? (Score:2)
However would it not be possible to simply insert a system between the two hosts (A & B) that are trying to transmit and then have your device pretend to be system B to system A and pretend to be system A to system B. This should ensure that it is possible to get all of the data transmitted. A tad more complicated than doing it passively
Omitted "detail" (Score:2)
Check for example the quantum cryptography setup description on a resarch page [univie.ac.at]:
Only after a measurement run is completed, Alice and Bob compare their lists of detections to e
Re:Omitted "detail" (Score:2)
Example:
Alice measures: v1 d1
Re:Omitted "detail" (Score:2)
Without
If I've got this right ..... (Score:2, Interesting)
Re:If I've got this right ..... (Score:2)
Re:I can't believe it... (Score:3, Informative)
It's not that the message itself is unbreakable, it's the overall system and process that is unbreakable. The great thing about quantum cryptography is that if anyone does intercept and read your message somehow, you can see with complete certainty that it happened. That's the nature of quantum physics -- things change when observed. So if you don't get what you expected, you know the
Re:I can't believe it... (Score:1)
If I understood you well, a transmission can be intercepted, but once this is done, it'll be immediately noticed.
I should agree that this will offer some major advantages for securing protocols......... 10x.
Re:I can't believe it... (Score:2)
It is theoretically possible that an attacker could someone split off a few of those photons, letting the rest proceed to their destination, in which case the attacker may not part of the key that Alice and Bob agree upon. Other ways to attack the protocol have been established
Re:Question I've been wondering about for a longwh (Score:2)
The hacker cannot simply intercept and repeat the key, because his interception modifies the photon before he gets a chance to read it. If he retransmitted his i
Yes it will, it's just not a PGP competitor. (Score:2)
Re:quantum cryptography isn't about cryptography (Score:2)
It's still a simple OTP encryption - it's just that they'll know if anyone's intercepted some of the key on the way.
Re:Tachion-flux? (Score:2)
Well,
Re:Same old, same old (Score:2)
The point of quantum cryptography is that you never have to reuse a key. I can generate a one-time pad, perhaps using a radioactive source to provide randomness, and transmit it over the quantum link. The advantage of this is that I can be certain it has reached my correspondent without being intercepted, and I can now encode my _real_ message and send it over conventional channels.
You only use the quantum link for key exchange, not for sending the actual messages. If one o