top of page

QUANTUM CRYPTOGRAPHY

Quantum Cryptography sounds complex probably because it is.

Although the subject has been around for a couple of decades, quantum cryptography (not to be confused with post-quantum cryptography) is quickly becoming more critically relevant to our everyday lives because of how it can safeguard vital data in a way that current encryption methods can’t.

Consider, for example, the trust you place in banks and commercial enterprises to keep your credit card and other information safe while conducting business transactions online. What if those companies – using current encryption methods – could no longer guarantee the security of your private information? Granted, cyber criminals are always trying to gain access to secure data, but when quantum computers come online, that information will be even more vulnerable to being hacked. In fact, hackers don’t even need to wait for quantum computers to start the process because they’re collecting encrypted data now to decrypt later when the quantum computers are ready. With quantum encryption, that’s not the case because your information will be unhackable.

WHAT IS QUANTUM CRYPTOGRAPHY??

~Now we arrive at the chief question about what exactly is QUANTUM CRYPTOGRAPHY. Well, as far as the understanding goes, we know that QC help us store data in small energy packets called photons emitted by atoms themselves. Talking in detail, process of encrypting data, or converting plain text into scrambled text so that only someone who has the right “key” can read it. Quantum Cryptography, by extension, simply uses the principles of quantum mechanics to encrypt data and transmit it in a way that cannot be hacked. It may sound complicated but it's the most helpful tool that we have now.

The 'key' referred is for encryption and decryption.

Many of you might think that QC sounds simple due to its definition but the lies in the principle of QUANTUM MECHANICS:

The particles that make up the universe are inherently uncertain and can simultaneously exist in more than one place or more than one state of being.

Photons are generated randomly in one of two quantum states.

You can’t measure a quantum property without changing or disturbing it.

You can clone some quantum properties of a particle, but not the whole particle.

As many of you might have noticed, I mentioned post QC and QC.. But what are they? Let's understand: Post-quantum cryptography refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. These complex mathematical equations take traditional computers months or even years to break. However, quantum computers running Shor’s algorithm will be able to break math-based systems in moments.

Quantum cryptography, on the other hand, uses the principles of quantum mechanics to send secure messages, and unlike mathematical encryption, is truly un-hackable.

HOW QUANTUM CRYPTOGRAPHY WORKS

Quantum cryptography, or quantum key distribution (QKD), uses a series of photons (light particles) to transmit data from one location to another over a fiber optic cable. By comparing measurements of the properties of a fraction of these photons, the two endpoints can determine what the key is and if it is safe to use.

Breaking the process down further helps to explain it better.

The sender transmits photons through a filter (or polarizer) which randomly gives them one of four possible polarizations and bit designations: Vertical (One bit), Horizontal (Zero bit), 45 degree right (One bit), or 45 degree left (Zero bit).

The photons travel to a receiver, which uses two beam splitters (horizontal/vertical and diagonal) to “read” the polarization of each photon. The receiver does not know which beam splitter to use for each photon and has to guess which one to use.

Once the stream of photons has been sent, the receiver tells the sender which beam splitter was used for each of the photons in the sequence they were sent, and the sender compares that information with the sequence of polarizers used to send the key. The photons that were read using the wrong beam splitter are discarded, and the resulting sequence of bits becomes the key.

If the photon is read or copied in any way by an eavesdropper, the photon’s state will change. The change will be detected by the endpoints. In other words, this means you cannot read the photon and forward it on or make a copy of it without being detected.

Let me show you an example:

Imagine you have two people, Alice and Bob, who want to send a secret to each other that no one else can intercept. With QKD, Alice sends Bob a series of polarized photons over a fiber optic cable. This cable doesn’t need to be secured because the photons have a randomized quantum state.If an eavesdropper, named Eve, tries to listen in on the conversation, she has to read each photon to read the secret. Then she must pass that photon on to Bob. By reading the photon, Eve alters the photon’s quantum state, which introduces errors into the quantum key. This alerts Alice and Bob that someone is listening and the key has been compromised, so they discard the key. Alice has to send Bob a new key that isn’t compromised, and then Bob can use that key to read the secret.

Quick summary on QUANTUM CRYPTOGRAPHY:

Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solution to the key exchange problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is impossible to copy data encoded in a quantum state. If one attempts to read the encoded data, the quantum state will be changed (no-cloning theorem). This could be used to detect eavesdropping in quantum key distribution

There are still many mysteries to solve, many Paradoxes to face. Until then..

Stay scientific, stay protected.

This is Aryan Panchal signing off.

1 comment

Recent Posts

See All

댓글 1개


Sumeet
Sumeet
2019년 7월 28일

AWESOME WORK

좋아요
bottom of page