Posted on 09/13/2003 8:50:16 AM PDT by P.O.E.
Quantum cryptographyhailed by theoreticians as the ultimate of uncrackable codesis finally going commercial
IN THE 1992 film Sneakers, the ostensible research topic of one of the main characters was something called setec astronomy. This was an anagram of the words too many secrets. The research was supposed to be about developing a method for decoding all existing encryption codes. Well, if that were ever the case, it certainly isn't any morethanks to a start-up in Somerville, Massachusetts, called MagiQ.
MagiQ is in the final stages of testing a system for quantum cryptography, which it plans to release commercially within the next few months. Encryption engineers have long waxed lyrical about quantum cryptography, but this is among the very first commercial implementations. The advantage of quantum cryptography schemes is that the code they generate are simply noteven in theorybreakable.
The scheme devised by MagiQ, called Navajo, does not use quantum effects to transmit the secret data. Instead, it is the keys used to encrypt the data that rely on quantum theory. If these keys are changed frequently (up to 1,000 times a second in Navajo's case), the risk that an eavesdropper without the key would be able to decrypt the data can be proved mathematically to be zero. Of course, given the key, the task would become a trivial one.
Navajo transmits the changing key sequence over a secure fibre-optic link as a stream of polarised photons (indivisible particles of light). Because the polarisation reflects the amount of electro-magnetic radiation allowed to radiate at an angle to a light beam's direction, it can be considered to be a measure of the angular dependence of the light.
Should an eavesdropper tap into the secure fibre-optic line, he would disrupt this stream of polarised photons by the very act of observing themand the tampering could be instantly detected. By changing the key frequently, Navajo could turn an off-the-shelf encryption scheme such as AES (Advanced Encryption System) into something that was essentially uncrackable.
As in all good encryption schemes, Navajo employs an element of redundancy. The sender has two random-number generators. The first is used to generate a random stream of zeros and onespart of which will form the key. The second random-number generator chooses which polarisation basis the sender will use to transmit a given bit of the key. The sender uses two different polarisation bases, which are at right-angles to one another. Only by measuring in the correct polarisation basis can a receiver see which bit was sentotherwise the result is meaningless.
For each bit, the receiver arbitrarily chooses which polarisation basis to use. The sender and receiver then talk over an open channel and find out which bits they measured using the same basis. These bits (about half of the total) then constitute the key. If someone has been eavesdropping, some of these bits will have been disrupted. In that case the receiver will be unable to decode the message, and will thus conclude that someone is listening in.
This much is standard quantum cryptography. What is harder is building the hardware that can do it quickly and cheaply enough to be commercially viable. MagiQ is in a race with a Swiss company called ID Quantique to be the first to do so, and currently appears to be in the lead.
Of course, if the quantum signal could be transmitted wirelessly, it would liberate users from the cost and constraints of a fibre-optic line. Bob Gelfond, MagiQ's founder and chief executive, is coy about the possibility. He admits that his firm is working on the idea, but is not saying anything at the moment.
For the time being, Navajo requires a dedicated fibre-optic link, which only large corporations or governments are likely to have. And it currently works only at distances of up to 50 kilometres. Any longer than that and random interference degrades the stream of photons and makes them unusable. But within these constraints, Navajo is fairly cheap. MagiQ plans to sell it for $50,000 a set.
Given the glut of unused optical fibre buried beneath the streets of the world, MagiQ is optimistic about Navajo's prospects. Andrew Hammond, a vice-president at the company, reckons the market could potentially be worth more than $1 billion a year, with much of the business coming from firms with valuable intellectual property, such as drugmakers and aircraft companies.
I hate this kind of sloppiness. If the code is mathematically provable to be uncrackable at 1 kHz key-change rate, then it's also uncrackable at 1 Hz or one change per year for that matter, nothing special happens at 1,000.0000 times per second that doesn't apply at 999 Hz. Mathematically, the code is either uncrackable, or it isn't.
??? I wasn't aware of this. Anyone know the backstory?
If the link is "secure," then you don't need encryption in the first place. QED.
If the encryption system requires a "Secure" link, then it follows that the encryption system itself isn't secure.
Quantum cryptology has always been a buzzword for getting budgets out of the gullible.
The theory is that Heisenberg's Uncertainty Principle can be used to insure that no one intercepts your data. After all, per Heisenberg, you can know either the position or the momentum of the charge, but never can you know both simultaneously.
So using this theory, Quantum cryptologists encode data either on the position or on the momentum of the charge, and whoever first reads this data (like a hacker tapping a line) will upset the quantum system for any subsequent readers (such as the true intended receiver), thus allowing either the detection of the hacker or the data to go through.
And that all sounds great and wonderful, until you realize that an eavesdropper can simply recreate whatever data is desired and retransmit the new charge, with the receiver now not being any wiser to the interception.
In other words, Quantum Cryptology by its very nature is **never** secure from a determined hacker, even though on the surface it appears as though Heisenberg's Uncertainty Principle would secure it.
The hacker can simply recreate whatever data that she intercepted, and the receiver can't discern is the data is original or recreated.
Actually, the problem is MUX...Multiplex.
As of two years ago, 128 distinct colors could be sent down the pipe simultaneously...and who knows just how many colors are possible today!!
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.