

Quantum Encryption Explained 126
angelos writes "New Scientist Magazine has an article discussing the theories of Quantum Encryption. Short and not too complicated an article, but makes for some interesting reading. " Very cool overview of the subject - takes a look at the potential future of encryption and why the curent system of encryption will not last.
Electronics CAN generate random numbers (Score:3)
Pulse of light? (Score:1)
Uh, what exactly is the difference between "pulse of light" and "photon"? Just the amount of photons?
Re:Quantum Computing vs Regular Computing (Score:1)
Factorization (Score:1)
How I would decrypt an "Unbreakably encrypted" Msg (Score:1)
Holy man in the middle attacks, Batman...
Re:Man-in-the-middle? No! (Score:1)
I must be missing something here.
Quantum WHAT? (Score:1)
Just my 2c
- Ben Stewart
NeuralAbyss Software
http://get.to/neuralabyss.software
- NeuralAbyss
~^~~~^~~~^~~~^~~~^~~~~^^^~~~~~~~~~~~~~~~
Real programmers don't comment their code.
How does polarization get preserved in fiber&sat? (Score:1)
Also, how does it get retransmitted from the satellite? Or does it just get bounced? If the latter, again how does polarization get preserved? Don't mirrors also repolarize?
I'm confused.
Re:SOMEBODY DIDN'T READ THE ATRICLE. (Score:1)
Yes, it requires either much better algorithms, or possibly quantum computers to crack todays ciphers, but the article had nothing to do with quantium computing -- or breaking ANY form encryption at all.
The article is about quantum encryption, which I have to say I find fascinating, even if daunting -- transmitting a single photon across 300km, without altering the polarisation.... wow.
--
David Taylor
davidt-sd@xfiles.nildram.spam.co.uk
[To e-mail me: s/\.spam//]
It's still impractical (Score:1)
Re:Man-in-the-middle?IOGETIT NOW! (Score:1)
I understand dit now!
YEAH!
COOL!
I LOIKE IT!
ok, check 9ut the table bwelow
first columnis the angle of the filter Aloce (foxxy chick thst she is) uses to transmit her hard core pr0n to Bobby.
2nd colum is the filter bobby uses the REceivne the photon. the result comlung is the result - yes means he gets it, no means it's clobked and maybe merans its in a quantum stat like Shcrindongers pussy, baybeeeee...
Trans Rec Result
----- --- ------
0 0 yes
+45 0 maybe
0 +45 maybe
+45 +45 yes
0 90 no
+45 90 maybe
0 -45 maybe
+45 -45 no
so i;m wrpng about the noninvqsive maninthemiddle attak, but not about the full mitm attack1
Coming soon to a website mear ytou: WHEN MEN I~N THE ~MIDDLE ATTACK!~!
Wow.. its amazxingwhat this amoumt of alcogol can fdo for one's emtna;l faculties.
I stillthink it sucks, thiough..
D. is for superca;lifrajizsmbegeckspiladiocious.
Re:Quantum Encryption and IP (Score:1)
Acceptable error rate? (Score:1)
The article sez:
Okay, let's say Alice and Bob are sure that Eve has not interfered. Nonetheless, Alice and Bob disagree about 16 out of every 1000 bits in "their key", right? Doesn't that seem like a bit of a problem? They could try to use some sort of redundancy check in their communication, but it still seems entirely possible that Bob will be unable to decrypt a message from Alice with certainty.
I'm no expert on this stuff. Am I missing something?
-- Brian
Re:Authenticating Bob... (Score:1)
"Bennett and Brassard proposed using photons polarised in different directions to represent 1 or 0. If Eve tried to intercept the key, she would have to measure the photons, which would effectively mean absorbing them. To avoid being spotted, Eve would have to retransmit the photon to Bob. However, because of the strange way that quantum particles work, Eve does not always measure the same polarisation that Alice sent. That in turn means that she cannot be sure that she is retransmitting the correct orientation. Thus Eve's interception will inevitably affect the transmission of the key, and Alice and Bob should be able to spot this, discard the key, and try again with a new one."
Re:Man-in-the-middle? No! (Score:1)
Could there be a back door in the satellite? (Score:2)
(Score: -1, Unfunny)
--
Quantum Encryption and IP (Score:2)
Of course, if every pair of hosts create a one-time pad in this manner for each IP packet that they exchange, it could work, but that would really suck up bandwidth since you need one bit of key for every bit of data. I suppose we could string fiber between all possible pairs of computers on the planet, or maybe just broadcast neutrinos directly. Not this month, though.
Let's not quit working on mathematical encryption algorithms just yet.
Re:Pessimism about modern crypto totally unfounded (Score:3)
On the other hand, quantum key distribution, is provably information secure. No amount of computation renders it insecure.
By the way, this is mostly pure research, but there is a group at los alamos that have done quantum key distribution through 50 km of fiber, and 1/2 km of air, both with very small error rates (important for the security proof).
Re:Authenticating Bob... (Score:2)
No, I don't think the quoted piece of the article covers authenticating Bob (or Alice). It deals with the quantum improbability of both intercepting and accurately duplicating the key. If Bob and Alice have a reliable communications channel they can detect Eve intercepting the key with a reliability proportional to the key length. But the protocol seems to be incomplete here -- they do not describe the channel that guarantees that Alice is talking to Bob or that they can detect an imposter. How does Alice authenticate Bob and vice versa? Why is this protocol not vulnerable to a man-in-the-middle attack?
Yes, I understand that Eve can't both intercept the key and derive the values of each bit. That prevents Eve from simply intercepting and retransmitting the key undetected.
My question was how does Alice know she is talking to Bob and not Eve if Eve intercepts the key and pretends to be Bob to Alice and pretends to be Alice to Bob? The article assumes that Alice and Bob have a reliable method to communicate and can know they are talking to each other (the phone call). What is that method? It would seem to be a critical piece of the whole protocol. The article doesn't cover a cryptographically secure method of authentication -- and it wouldn't be fair to use current methods, since the justification for quantum cryptography is presented as current methods being crackable.
Re:How about satellite in the middle? (Score:2)
Suppose Alice and Bob want to generate a shared key, and Alice is in NY, and Bob is in CA, and the satellite is over the US. Alice and the satellite generate a key A, and Bob and the satellite generate a key B. The satellite then sends Bob (A XOR B), which Bob uses to compute A. Assuming Bob and Alice can trust the satellite, they can communicate securely with key A.
This technique is also useful for securely rekeying a satellite (e.g. changing the key HBO uses to encrypt their transmissions every month).
I got this info from a presentation given by one of the guys from LANL a couple days ago...
Re:Authenticating Bob... (Score:1)
Fortunately, secure authentication schemes exist even without quantum mechanics. For example, suppose you and I each already have a 20 bit key. I just ask you what it is and if you can tell me I know it was you. Obviously this is secure (up to a one in a million chance). Of course, there are two unavoidable problems with this. One, you may have handed over your key to someone else at gunpoint. Two, we'd better not use that same key again because Eve could have listened to it.
Problem one cannot be solved. Problem two is solved by not reusing the key, but instead using new key that we exchange using the quantum key distribution. This makes denial of service attacks particulary annoying, since if we have to wait and try again later we'd better authenticate again using a new key and we might run out before we get to use quantum key exchange to make some more. Doh!
The real situation is more complicated than this because I don't need to juse verify that I am talking to you at the start of the conversation, but rather must authenticate each bit of our conversation, without using up more key than we can get back by the quantum key distribution. This is also possible with a little more complexity.
Re:It definetely needs a form of authenication. (Score:2)
Or the secure channel can be simply the string of dedicated fiber optic cabling running from one building to the next, and therefore you assume that you trust who ever is on the other end of that line.
I'm just saying you need a trust mechanism. PGP helps to provide that infrastructure. This does not, so far as I saw.
Re:It definetely needs a form of authenication. (Score:2)
It's simply impossible to send protons positioned as such through a switch or router (or twenty a la the internet) and be assured that they arrive at the other end in the same position that they were in when they left.
If you string together two locations with dedicated lines, that's one thing, but John Q. Public CAN NOT benefit from this in the slightest way shape or form, in regards to e-commerce or other internet based transactions. Unless every vendor or potential vendor strings their own cable to their home, it's just not happening.
Re:It's still impractical (Score:1)
Um, hello??? (Score:1)
Re:Man-in-the-middle? (Score:1)
Man in the middle? Not according to Bennett. (Score:1)
First, Bennett requires that Alice and Bob have access to a medium that cannot be actively (man-in-the-middle) monitored, such as a phone call. Any eavesdropping of a quantum channel is, thanks to Heisenberg, active. But with a passive-eavesdropping-only public channel, Alice and Bob can tell each other which photons were received and which weren't. Thus, if Eve becomes the "man" in the middle, she changes the polarisations of all of the photons she sends out according to that Heisenberg fellow.
Secondly, Alice and Bob base the security of their system on error rates of photon transfers. They would notice an unusually high error rate, and avoid further communications from that line. And because all they did was send random one-time-pad information, Eve has gained absolutely nothing of use from all of her work.
Quantum cryptography essentially provides effective key distribution for two people who have a passive-eavesdropping-only communications medium, so all the arguments about a man in the middle become moot.
Re:Man-in-the-middle? (Score:1)
> photons (i.e. pretend to be Bob), and then send > photons of the same polarity on to Bob
Here's where quantum mechanics enters the game.
There are two different kinds of polarization:
Now eve doesn't know whether the photon has
been prepared the first or the second way. She
has to measure one of both and then she replays what she got - fivty percent chance is that she
measured linear polarization while she should
have measured circular polarization or the other
way round.
After Alice and Bob have been quantum chatting
for some time, Alice will reveal for some arbitrary photons the type of polarization she used and using this information Bob can detect Eve.
So much about the good news, here's the bad news;
scheme is broken: Eve will simply retransmit the
polarization types she has transmitted instead of Alice's type of polarization.
one photon, Eve could steal the second one,
let the first pass and noone would realize.
in use today will carry the photons for
approximately 10km and has amplifieres built
in in order to carry the signals for longer distances. You need some kind of quantum
repeater which will reshape your quantum signal.
This is a current research topic. I'm not sure
about security concerns regarding these quantum repeaters.
that Eve introduced and errors due to noise that happen even in the absence of Eve.
Re:I am not suprised (Score:1)
Secondly, in response to your post: would anyone have believed me if I had said in the mid 60s that the US government has an aircraft that easily travels at mach 3? Of course not, no one would have. The SR-71 wasn't declassified until the early 90s. It still holds records 35 years after it was built.
My post wasn't intended to prove that such advanced technology as I claimed exists for certain, but rather point out that it is incredibly likely.
-----
What about adaptive optics? (Score:1)
Not so fast.
Astronomers have found a way to overcome the atmosphere's turbulence: adaptive optics. If I recall correctly, they shine a laser upwards to create an artificial star, and then by monitoring the twinkling of the artificial star, the telescope mirror is dynamically distorted hundreds of times per second to compensate.
Such a mirror is now in place at Mauna Kea... the resolution rivals Hubble's, at a fraction of the cost. See Gemini North Sees the Light [skypub.com] (scroll down to "Friday, June 25"), or the media fact sheet from the Gemini Project [gemini.edu].
See also this picture of Pluto and Charon [astronomynow.com].
Now, the question is: can adaptive optics be used in the other direction, to observe the ground from space?
Did astronomers actually invent adaptive optics, or is it just another Cold War technology spinoff? Makes you go Hmmmmm.....
Needed Soon, Quantum DEcryption may be here NOW! (Score:2)
Re:great encryption, but we must remember.. (Score:1)
--synaptik
Re:great encryption, but we must remember.. (Score:1)
--synaptik
Man-in-the-middle? (Score:2)
One time pad (Score:2)
great encryption, but we must remember.. (Score:1)
seems like a lot of trouble to go through and end up your phone conversation being overheard. i suppose with the way the filters work the "Eve" wouldn't have much luck catching the same photon's. but we all should remember your trusty telephone (especially those cordless or cellular ones) are probably a lot less secure than even the most basic form of computer encryption. people seem to forget that a lot.
tyler
Quantum computers and Quantum encryption (Score:1)
Re:Man-in-the-middle? (Score:1)
--synaptik
Not really encryption? (Score:1)
Re:great encryption, but we must remember.. (Score:1)
Pessimism about modern crypto totally unfounded. (Score:3)
Quantum crypto requires bizarre quantum properties of your message to be preserved from end to end - there's no possibility of an ordinary routing network. Furthermore, as the Dodger points out, it just pushes the problem into the authentication domain, and that's resting on precisely the same "untrusted" mathematics and a few social problems too. It's an interesting toy, but the public key crypto we already have - that we can do with straightforward hardware and the networks that already exist - will continue to be the workhorse for 99.99% of encrypted world communications, and don't let anyone try and tell you otherwise.
I do wish people wouldn't mutter dark warnings about perfectly good systems in order to sound interesting: the field of security has enough FUD as it is.
--
encryption (Score:1)
Re:Needed Soon, Quantum DEcryption may be here NOW (Score:2)
The basic premise is this: the quadratic sieve needs to find numbers which are "smooth" (meaning that a number is the multiple of a certain number of primes stored on a list). These numbers are used (well, one of 'em is used, anyway) to figure out the factors of the large number (number theory omitted here, beyond my comprehension).
Anyway, you make up a base of (say) 200000 primes. You assign each of these primes to an LED. You give each of these LEDs a little countdown timer, and hook it all up to a clock running at (say) 10 GHz. You set each countdown timer equal to the prime assigned to its attached LED. When the counter reaches zero, the LED flicks on and the timer resets. It flicks back off the next cycle.
After X pulses (where X is a smooth number), all the LEDs that are supposed to represent the factors of X will turn on. A small photodetector will determine if enough light has been generated to consider the number interesting (has large enough or plain *enough* factors to have a decent probability of being useful). If it is determined interesting, the number is passed on to the computer.
Since it's all running at 10 GHz, and the only outputs are few and far between (relatively speaking), the rest of the calculations can be done on a computer.
I know that this does not even *begin* to cover a number of significant technical details-- please don't flame me.
I also know that I'm not much of a number theory guy, but I think I get the basic premise (though I'm not great at explaining it). Please don't flame me-- I don't take Number Theory until next semester, okay?
Re:Authenticating Bob... (Score:2)
Perhaps, but I would feel so much more comfortable with something that can be automated like contemporary public key protocols, which only require real authentication once and provide for public channel verification thereafter.
That "implementation detail" would seem to be a bit more difficult in a world where current public key cryptography is no longer effective, as in the case where we resort to using quantum cryptography.
Re:Authenticating Bob... (Score:1)
Re:Needed Soon, Quantum DEcryption may be here NOW (Score:1)
"There is no surer way to ruin a good discussion than to contaminate it with the facts."
Re:I am not suprised (Score:1)
You know all those cool satilite photos in the movies.. the ones where you can see the headlines of a newspaper lying on the ground? The US government had that technology in the 60s!
Uh, no. All you have to do to prove this wrong is to figure out what the maximum resolution is, given
And you don't think the RSA can cut 512 like butter? Of course they can, what else do you think all that money is used for?
And your evidence for this is? So far, all you've got is hot air.
Its not a bad thing that the US government posseses such power... its very good in fact. It won't be misused either...
Uh huh. Past discussion here has shown how much we can trust the government to not misuse authority. No need to cover that ground again. Let's just say that you're view is hopelessly optimistic.
...phil
Who says Eve must re-transmit ALL of the pho... (Score:1)
Why you're all missing the point (Score:1)
The only known way to keep your message secret, given the existence of QCs, is to use quantum key exchange as described in the article. Unfortunately, it seems to only be good for confidentiality. There are no quantum equivalents to digital signatures, digital cash protocols, etc.
It definetely needs a form of authenication. (Score:2)
While this may be a great thing for satelite communications and for closed networks, I don't see how it will ever evolve it's way down to the desktop. How will an electron maintain its' position as it travels through a switch or router? What about sending down a fibre optic line (cable modem) and then having the message relayed through a satelite, then back down to a fibre-optic cahnnel on the other side of the globe?
No... Public key is here to stay. If it's compromised (via improved factoring attacks, TWINKLE, etc...) then we're back to square one... This isn't a subsitute that John Q. Public can use.
Quantum Computing vs Regular Computing (Score:1)
Since Regular computing requires on or off bits (binary), and Quantum computing has bits that are on, off, or both..does this mean the Quantum computers work in Base-3 (tertiary) system?
If so, we can forget about 2, 4, 8, 16, 32, 64, 128, 256 and all those "special" numbers everyone has memorized and start using 3, 9, 27, 81, 243, 729...
Takes some getting used to, doesn't it?
-= NJV =-
... waiting for his 531441 bit key
How about satellite in the middle? (Score:1)
Also, on a different note, the title of this story should have been ``quantum key exchange'' not ``quantum encryption''. I was misled into thinking that this would be about quantum computing rather than communication.
Re:Man-in-the-middle? (Score:1)
Legal warning! (Score:3)
ADVISORY: There is an Extremely Small but NonZero Chance that, through a Process Known as "Tunneling," this Post May Spontaneously Disappear from its Present Location and Reappear at any Random Place in the Universe, Including your Neighbor's Domicile. The Poster will Not Be Responsible for any Damages or Inconvenience that May Result.
--
Re:It definetely needs a form of authenication. (Score:1)
If you have a secure channel of communication, why aren't you transmitting the message itself via that as well?
Re:Authenticating Bob... (Score:1)
a shared secret since you have to go to the
trouble of agreeing to timing and so on. So if
any two parties intending to communicate can
somehow get some shared secret across to both
endpoints, they can update the shared secret at
the beginning of every later successfully secured
connection. This new shared secret could be used
to authenticate the next time. This protects
against MITM to the extent you can trust both the
secrecy of the original shared secret and the
unpredictability of later ones. However, this
shared secret can be a lot smaller than an agreed
to pad, since it's only used to authenticate.
Re:What about adaptive optics? (Score:1)
Found the following Air Force press release [deja.com] on sci.space.news on Deja.com:
" To show its commitment, the Air Force is investing 30 percent of its science and technology budget -- more than double its current figure -- to accelerate development of space operations vehicles, space-based radar and laser, and adaptive optics."
Re:Factorization (Score:1)
I think this is an interesting article, but as other posters have noticed, it doesn't provide an unconditionally secure authentication process to go along with the unconditionally secure key generation.
Without authentication, the point is moot, because while you can be sure what you're saying is secure, you can't be sure that you're saying it to the right person.
Also, given the rampant speculation on factoring methods in this discussion, I might as well point out the fact that elliptic curves are much harder to crack, for the main reason that they're not smooth. Therefore, TWINKLE wouldn't work on them. A lot of research needs to be done on EC crypto before they can be trusted to the extent that RSA is today.
And all in all, RSA isn't the worst choice out there, as long as certain precautions (enumerated in Applied Cryptography, among other places) are taken. The RSA patent expires Sept. 20, 2000, which will be a Very Good Thing(tm). I'm keeping some chapagne on ice... well, not really, but I'll probably be pretty stoked.
Re:It definetely needs a form of authenication. (Score:1)
But still...if they have that dedicated fiber for authentication and they know as a certainty that the party at the other end of it is who they're trying to send the message to and nobody else, why don't they just send the transmission over that?
Re:Pessimism about modern crypto totally unfounded (Score:1)
there's nothing wrong with using factorization as the idea is so simple yet powerful that no one will likely prove P=NP. We can estimate how infeasable a brute force attack would be.
I'd be more hesitant to use quantum crypto since it depends on the uncertanty principle, which is still a theory.
Perfect: the government can still listen in! (Score:1)
You guessed it: the government. And then ask yourself: do you trust them with it?
Quantum cryptography is great if you are in line of sight of the party you want to communicate with, and it may be a perfect way to communicate with your aunt on the mars colony; but the only other option is private high-grade fiber from every home to every home, and that's a hell of a lot of fiber. (I forgot to mention a big mirror-carrying satellite in the sky as another option, although I don't know enough quantum physics to know if it would still work after the photons are deflected)
By the way, although the article is interesting, it isn't new, you can also find out about quantum crypto in Bruce Schneier's Applied Cryptography, 2nd edition, pages 554-557.
EjB
Re:How does polarization get preserved in fiber&sa (Score:1)
Er.. that was exactly my question.. and you didn't answer it at all.
WHY don't they change polarity when reflecting off of the side of the fiber? I mean, the whole point of polarizing sunglasses is because sunlight gets polarized horizontally when they reflect off of the ground, so why doesn't it get repolarized when it hits the side of the fiber?
Re:great encryption, but we must remember.. (Score:1)
Here's the deal: It's a two part key-transmission protocol. The quantum channel is assumed to be actively eavesdropped (i.e. eavesdroppers are, without a doubt, changing something, thanks to that German guy). The regular channel can/is being passively eavesdropped (i.e. eavesdroppers aren't changing anything, just listening). The important thing is that they share only a few (not all) of the correctly receiveded bits so they can compare whether or not the error rates were correct. It's the error rate that matters, they can afford to sacrifice the values of a few bits. It doesn't matter if Eve can catch the photons; as long as Eve doesn't know the exact polarizations that Alice uses prior to Alice's transmission, it's guaranteed that Eve will screw a few up in her eavesdropping, and thus Bob will get wrong values, compare them with Alice, decide they were being eavesdropped, and they will cease communications on that channel.
Doping of fiber optics to enhance fiber length. (Score:1)
I remember reading that in order to get the signal to go far enough to be usefull, they have to dope the fiber at intervals. Wouldn't this equate to a re-transmission? So the problem is getting an undoped fibre long enough to be usefull, and cheap enough to be affordable.
Also, would Nortel's newly announced optical switch work? It uses refraction to switch the signals between fibers.
Jason PollockRe:Who says Eve must re-transmit ALL of the pho... (Score:1)
Alice doesn't transmit the key. She transmits a string of potential values to use in the key. Not until Bob recieves the values & they compare notes via the insecure channel do they decide upon the key. Because of this, any information that Eve recieved & didn't somehow retransmit would have no effect on the final key.
Information a bit thin... (Score:1)
While this article introduced some cool sounding ideas, it seemed a bit thin on real information.
First of all, it has turned its back on the neat solution of public key encryption which foils many of Eve's opportunities. And it assumed that "some mathematical genius" would eventually learn to factor numbers created by large primes. While this is, of course, a possibility, I am of the opinion that it is quite remote. Perhaps it was just the simple language used in the article, but the actual cryptographic evidence wasn't very robust.
If some mathematical genius can break current public key encryption schemes, doesn't it seem just as likely that someone will be able to solve the problem of how to intercept the quantum encryption?
---
Re:Man-in-the-middle? (Score:1)
I did some researh work on this a few years back...I'd dig it up but I thought the article explained this. *shrug*
*All* encryption is vulnerable to Man-ITM (Score:3)
If you can intercept *all* communications between the two parties, direct and indirect, and substitute *all* messages for ones you've written yourself, then nothing at all will stop a MitM attack. You have to have some sort of authentication lever.
However, you're right to say it's a particular weakness of this system, because the system depends on Bob sending Alice an authenticated message of what measurements he took. If Mallet can subvert this channel he can read the secret message. And QC doesn't provide provably secure authentication, since that's impossible - it's a social problem as much as anything else. Perhaps you could prove that the sender of a message knows a particular secret, but how will that help if you can't be sure who holds the secret?
And you're also right that it's totally impractical for real use.
--
Re:Not really encryption? (Score:1)
But once you have a one-time pad, you only need to XOR it with your plaintext. Why would you need a complex encryption scheme? No key, no plaintext. One-time pads are the safest encryption method, period.
"There is no surer way to ruin a good discussion than to contaminate it with the facts."
I'm pretty sure this story is nonsense. (Score:2)
The UK Government are mulling over how to cripple domestic crypto without getting hit over the head at the moment, so scare stories about crypto are appearing all over the press at the moment, especially the Murdoch-owned press; apparently the crypto we all use is worthless, but the Bad Guys are using unbreakable crypto to hold up banks so it must be stopped, and we must go to the GCHQ (our NSA) for "consultancy" on what best to do about it.
--
Re:Man-in-the-middle? (Score:2)
Re:Pessimism about modern crypto totally unfounded (Score:2)
Weak link in the scheme? (Score:1)
In other words, suppose Alice thinks she's sending to Bob but, in fact, Eve intercepts Alice's transmission and prentends to be Bob. Alice then goes through the whole protocol, thinking she's set up a connection with Bob. To keep Bob fooled, Eve sets up a bogus session with Bob to make him think he's talking with Alice. Eve then decrypts Alice's messages, reads them, then re-encrypts them and sends them on to Bob.
This problem is solved by digital signatures with todays systems but it seems to me that there is no such thing for Quantum encryption yet.
Re:Information a bit thin... (Score:1)
The article doesn't go into specifics, but quantum crypto has quite a few limitations, distance being the most important for day-to-day communications. The longest quantum channel I've heard of is about 2km. Photodetectors/emitters are also a problem. For quantum crypto to work completely, you have to be sending single photons(or photon pairs) out and detecting single photons. Current experiments are emits "small" numbers of photons. The problem is that Eve can split the group of photons and detect the spin in an undetectable manner.
Quantum crypto has a ways to go before it is practical.
Man-in-the-middle? No! (Score:1)
When a light signal with intensity I0 and initial polarization of, say, 0 deg is incident on a polarizer with rotation angle x, the transmitted intensity is given as I = I0*cos(x)*cos(x). Thus, if you intercept this signal with a polarizer rotated by 45 deg, you get I0*cos(45)*cos(45) = 0.5*I0 transmitted intensity.
Using a single photon rather than a stream produces a 50% chance that the photon passes through. If Eve's polarizer blocks the photon, either the photon was initially transmitted at a 90 deg angle to her filter, or was transmitted at a 45 deg angle to her filter and failed the 50-50 chance. If her filter allows the photon through, she knows what the polarization was and can retransmit the photon. When that retransmitted photon gets to Bob, it may well fail the 50-50 chance, providing him no information (remember, you only get information on the photons that pass your filter).
As an aside... if you transmit photons with a polarization angle of 0 into a filter with angle 90 deg, nothing comes through. If, however, you put a filter rotated an angle of 45 deg between the original two, you have a 50-50 chance of a photon passing the first filter, and being repolarized with a 45 deg angle, at which point, it has a further 50-50 chance of passing through the 90 deg filter (since the relative angle between the filter and the repolarized photon is now 45 deg).
The point being that any detection of the photon stream between Alice and Bob will affect the overall signal, and simple error checking, as mentioned in the article, will detect the intrusion.
--
No. (Score:5)
The proposed quantum scheme relieson the fact that whether a photon will pass through a filter polarized at 45 degrees to the photon's own aligment is random at a quantum level, eg. can't be determined. Eve is screwed at a fundamental physics level. The only thing that could crack this would be major changes in our understanding of particle physics.
It's open to debate whether this is more or less likely than finding a quick factoring method (or in the case of RSA, a quick way to find Phi(n) from n). . .
Single photon or not? (Score:1)
If so, this seems extremely susceptable to man in the middle attacks. Sure, Eve will have problems listening in, but all she has to do is read the key and transmit a new one. She'll run into problems with verification (she'd have to fake that too) but that doesn't seem impossible.
Maybe when transmitting the fake key she keeps saying it's wrong until Bob gets the same bits right she did. Then Bob will tell Alice to use the same keys Eve got right. That would certainly generate a lot retrys, though, which would make Bob suspicios if he's paying attention.
Come to think of it, this must involve only a single photon, otherwise it'd be trivial divide up the light beam and send it through a set of filters in paralel. Then Eve could know the polarity without any of this nonsence... duh.
Frankly, while this may, under certain controlled situations, be useful, I'm having a hard time seeing how it could be born out in the real world w/ noise and turbulence, and human error.
Re:Who says Eve must re-transmit ALL of the pho... (Score:1)
You could have the most unbreakable/uncrackable (or whatever you want to call it) method of transmitting data. That won't mean squat* if the individuals using the technology aren't willing or knowledgeable enough to take certain precautions to ensure an adequate and/or secure usage of said technology.
* squat - slang : the least amount : anything at all. Taken from diddly-squat.
base-3 (Score:1)
base-3 != tertiary
great...but does encryption prevent eavesdropping? (Score:1)
Re:How about satellite in the middle? (Score:1)
Timing transmissions to the nanosecond is an easy way to insure an accurate destination. Just check the time of transmission and compare it to the time it takes light to travel the distance.
photons (Score:1)
Re:SOMEBODY DIDN'T READ THE ATRICLE. (Score:1)
Quantum cryptanalysis probably won't happen. (Score:2)
--
SOMEBODY DIDN'T READ THE ATRICLE. (Score:1)
If you'd read the article, you'd know that.
LK
Re:Man-in-the-middle? (Score:1)
You're doing the NSA's job for them! (Score:4)
Learn a little about how modern crypto works (The Cryptogram [counterpane.com] is a good place to start). Read the descriptions of some of the AES candidates: Serpent, RC6 or Rijndael might be good ones to start with. Even in the supremely unlikely case that the NSA can crack everything we use, it would still cost them something in compute cycles, and encrypting all the world's email would still put a significant barrier in the path of their intelligence-gathering activities.
--
Re:Man-in-the-middle? (Score:2)
"Bennett and Brassard proposed using photons polarised in different directions to represent 1 or 0. If Eve tried to intercept the key, she would have to measure the photons, which would effectively mean absorbing them. To avoid being spotted, Eve would have to retransmit the photon to Bob. However, because of the strange way that quantum particles work, Eve does not always measure the same polarisation that Alice sent. That in turn means that she cannot be sure that she is retransmitting the correct orientation. Thus Eve's interception will inevitably affect the transmission of the key, and Alice and Bob should be able to spot this, discard the key, and try again with a new one."
Also, what happens when the photons pass from, say, a fibre, to an uplink. Or when they pass through the sattelite? Won't they lose their polarisation?
"Ultimately, they want to be able to fire individual photons to hit a satellite's receiver, which is only a few centimetres across and orbits at an altitude of 300 kilometres. The photons must pass through the atmosphere without being absorbed--so that the signal is not simply lost--and they must not change their polarisation. It's easy enough to make sure that the photons are not absorbed. You just have to choose a wavelength that the molecules in the atmosphere ignore. Hughes's team has opted for 770 nanometres. Longer wavelengths also pass through the air unscathed, but are more susceptible to turbulence, which changes the local refractive index of the air and thus twists the orientation of the photon's polarisation. Turbulence typically occurs on a scale of tens of centimetres, so 770 nanometres is short enough to avoid this."
And, finally, what about a pure mathematical attack, based on probability and stochastic principles?
"This type (one-time pad) of code is impossible to crack because each element of Alice's key is random. Even if Eve were to use computational brute force to try every possible key, she'd find that many of them made some sort of sense, and wouldn't know how to choose between the alternatives. Bob, on the other hand, has a copy of the key, and can decipher the message by simply subtracting the key from the encrypted text."
As you can see, all of the answers to your questions were in the article. It really is a very interesting article, but (IMO) you probably should have some type of basic understanding of cryptography before you read it. By "basic", I don't mean "what is cryptography?", or anything like that. Those kind of questions, to me, are on the same level as learning how to walk and talk, and as such, are below even "basic" level knowledge. One book that describes a lot about cryptography, even "what is cryptography"
Authenticating Bob... (Score:2)
I am not suprised (Score:1)
-----