Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Uncrackable beams of light (quantum cryptography)
Economist ^ | 09/04/2003 | Staff

Posted on 09/13/2003 8:50:16 AM PDT by P.O.E.

Quantum cryptography—hailed by theoreticians as the ultimate of uncrackable codes—is finally going commercial

IN THE 1992 film “Sneakers”, the ostensible research topic of one of the main characters was something called “setec astronomy”. This was an anagram of the words “too many secrets”. The research was supposed to be about developing a method for decoding all existing encryption codes. Well, if that were ever the case, it certainly isn't any more—thanks to a start-up in Somerville, Massachusetts, called MagiQ.

MagiQ is in the final stages of testing a system for quantum cryptography, which it plans to release commercially within the next few months. Encryption engineers have long waxed lyrical about quantum cryptography, but this is among the very first commercial implementations. The advantage of quantum cryptography schemes is that the code they generate are simply not—even in theory—breakable.

The scheme devised by MagiQ, called Navajo, does not use quantum effects to transmit the secret data. Instead, it is the keys used to encrypt the data that rely on quantum theory. If these keys are changed frequently (up to 1,000 times a second in Navajo's case), the risk that an eavesdropper without the key would be able to decrypt the data can be proved mathematically to be zero. Of course, given the key, the task would become a trivial one.

Navajo transmits the changing key sequence over a secure fibre-optic link as a stream of polarised photons (indivisible particles of light). Because the polarisation reflects the amount of electro-magnetic radiation allowed to radiate at an angle to a light beam's direction, it can be considered to be a measure of the angular dependence of the light.

Should an eavesdropper tap into the secure fibre-optic line, he would disrupt this stream of polarised photons by the very act of observing them—and the tampering could be instantly detected. By changing the key frequently, Navajo could turn an off-the-shelf encryption scheme such as AES (Advanced Encryption System) into something that was essentially uncrackable.

As in all good encryption schemes, Navajo employs an element of redundancy. The sender has two random-number generators. The first is used to generate a random stream of zeros and ones—part of which will form the key. The second random-number generator chooses which “polarisation basis” the sender will use to transmit a given bit of the key. The sender uses two different polarisation bases, which are at right-angles to one another. Only by measuring in the correct polarisation basis can a receiver see which bit was sent—otherwise the result is meaningless.

For each bit, the receiver arbitrarily chooses which polarisation basis to use. The sender and receiver then talk over an open channel and find out which bits they measured using the same basis. These bits (about half of the total) then constitute the key. If someone has been eavesdropping, some of these bits will have been disrupted. In that case the receiver will be unable to decode the message, and will thus conclude that someone is listening in.

This much is standard quantum cryptography. What is harder is building the hardware that can do it quickly and cheaply enough to be commercially viable. MagiQ is in a race with a Swiss company called ID Quantique to be the first to do so, and currently appears to be in the lead.

Of course, if the quantum signal could be transmitted wirelessly, it would liberate users from the cost and constraints of a fibre-optic line. Bob Gelfond, MagiQ's founder and chief executive, is coy about the possibility. He admits that his firm is working on the idea, but is not saying anything at the moment.

For the time being, Navajo requires a dedicated fibre-optic link, which only large corporations or governments are likely to have. And it currently works only at distances of up to 50 kilometres. Any longer than that and random interference degrades the stream of photons and makes them unusable. But within these constraints, Navajo is fairly cheap. MagiQ plans to sell it for $50,000 a set.

Given the glut of unused optical fibre buried beneath the streets of the world, MagiQ is optimistic about Navajo's prospects. Andrew Hammond, a vice-president at the company, reckons the market could potentially be worth more than $1 billion a year, with much of the business coming from firms with valuable intellectual property, such as drugmakers and aircraft companies.


TOPICS: Business/Economy; Extended News; Miscellaneous; Technical
KEYWORDS: cryptography; junkscience; science; technology
Words in parenthesis added to title for search criteria
1 posted on 09/13/2003 8:50:16 AM PDT by P.O.E.
[ Post Reply | Private Reply | View Replies]

To: P.O.E.
If these keys are changed frequently (up to 1,000 times a second in Navajo's case), the risk that an eavesdropper without the key would be able to decrypt the data can be proved mathematically to be zero.

I hate this kind of sloppiness. If the code is mathematically provable to be uncrackable at 1 kHz key-change rate, then it's also uncrackable at 1 Hz or one change per year for that matter, nothing special happens at 1,000.0000 times per second that doesn't apply at 999 Hz. Mathematically, the code is either uncrackable, or it isn't.

2 posted on 09/13/2003 9:04:26 AM PDT by coloradan
[ Post Reply | Private Reply | To 1 | View Replies]

To: P.O.E.
Given the glut of unused optical fibre buried beneath the streets of the world,

??? I wasn't aware of this. Anyone know the backstory?

3 posted on 09/13/2003 9:18:24 AM PDT by Xthe17th (http://groups.yahoo.com/group/repeal17)
[ Post Reply | Private Reply | To 1 | View Replies]

To: P.O.E.; Physicist; Lazamataz; Bush2000; Dominic Harr; Nick Danger; AdamSelene235; Sabertooth
"Navajo transmits the changing key sequence over a secure fibre-optic link as a stream of polarised photons..."

If the link is "secure," then you don't need encryption in the first place. QED.

If the encryption system requires a "Secure" link, then it follows that the encryption system itself isn't secure.

Quantum cryptology has always been a buzzword for getting budgets out of the gullible.

The theory is that Heisenberg's Uncertainty Principle can be used to insure that no one intercepts your data. After all, per Heisenberg, you can know either the position or the momentum of the charge, but never can you know both simultaneously.

So using this theory, Quantum cryptologists encode data either on the position or on the momentum of the charge, and whoever first reads this data (like a hacker tapping a line) will upset the quantum system for any subsequent readers (such as the true intended receiver), thus allowing either the detection of the hacker or the data to go through.

And that all sounds great and wonderful, until you realize that an eavesdropper can simply recreate whatever data is desired and retransmit the new charge, with the receiver now not being any wiser to the interception.

In other words, Quantum Cryptology by its very nature is **never** secure from a determined hacker, even though on the surface it appears as though Heisenberg's Uncertainty Principle would secure it.

The hacker can simply recreate whatever data that she intercepted, and the receiver can't discern is the data is original or recreated.

4 posted on 09/13/2003 9:38:42 AM PDT by Southack (Media bias means that Castro won't be punished for Cuban war crimes against Black Angolans in Africa)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Xthe17th
Huge buildout during the 90s by starry eyed venture capitalists. Then they realized that long range capacity wasn't the problem -- the last mile was.
5 posted on 09/13/2003 9:38:52 AM PDT by sigSEGV
[ Post Reply | Private Reply | To 3 | View Replies]

To: Xthe17th
The ability to pump data into fiber far far far outpaced demand in the past few years. So a lot of fiber got plowed, and then it turned out you could send 1000 more data down a fiber than any of the fiber owners predicted.
6 posted on 09/13/2003 10:39:27 AM PDT by eno_ (Freedom Lite - it's almost worth defending)
[ Post Reply | Private Reply | To 3 | View Replies]

To: sigSEGV; All
Huge buildout during the 90s by starry eyed venture capitalists. Then they realized that long range capacity wasn't the problem -- the last mile was.

Actually, the problem is MUX...Multiplex.

As of two years ago, 128 distinct colors could be sent down the pipe simultaneously...and who knows just how many colors are possible today!!

7 posted on 09/13/2003 10:42:32 AM PDT by Lael (It is time to make "OUTSOURCING" the litmus test!!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Xthe17th
??? I wasn't aware of this. Anyone know the backstory?

Emo got a part of it right. The other part of the story: Global Crossing, MCI, UUNet, Qwest, IGC, Williams. Detecting the common thread here is easy. The dot com boom made these guys go broke building EXPENSIVE infrastucture that the dot com bust made unnecessary. We will use it soon enough. I know I am doing my part.
8 posted on 09/13/2003 2:09:29 PM PDT by AdA$tra (Hypocricy is the Vaseline of social intercourse....)
[ Post Reply | Private Reply | To 3 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson