Featured Research

from universities, journals, and other organizations

You'd Have To Break The Laws Of Physics To Break This Code

Date:
April 28, 2000
Source:
American Institute Of Physics -- Inside Science News Service
Summary:
Scientists are a step closer to creating secret codes that are absolutely unbreakable, advancing hopes for protecting sensitive data from any kind of computer attack.

Scientists are a step closer to creating secret codes that are absolutely unbreakable, advancing hopes for protecting sensitive data from any kind of computer attack. Three independent research groups* are simultaneously reporting, in the American Physical Society's peer-reviewed journal Physical Review Letters (tentatively scheduled for publication in May), the first demonstrations of sending encrypted messages using "quantum entanglement."

Related Articles


Quantum entanglement, which Einstein called "spooky action at a distance," refers to particles that – even when very far apart – are intimately linked. Measurement of one entangled light particle (a photon), then, determines the properties of the other. Since quantum mechanics says that – until measured – a particle's basic properties can be in a combination of states, a code derived from entangled photons could stay truly secret until "read" by both a sender and receiver. Furthermore, eavesdropping attempts could be easily detected, since they would unavoidably disturb the photon's properties. In effect, the code is protected by the laws of nature.

Standard quantum cryptography, in which the sender creates and sends code made from a series of individual photons – with different polarizations (the direction in which a photon's electric field vibrates) representing the 0's and 1's of computer language – has been demonstrated before. But there have been drawbacks. Most of the time the very faint pulses used contain no photons at all, which is highly inefficient. In addition, sometimes the pulses contain more than one photon, in which case a technologically advanced eavesdropper could skim photons from the signal and covertly gain information about the secret key.

Quantum cryptography using entangled pairs of photons allows easier detection if a photon is "stolen." Also, the entanglement process generates an inherently random code while allowing the use of brighter pulses. The net result could eventually be a higher transmission rate, over longer distances, with greater security.

The data encryption currently used, in electronic banking for example, relies on a secret code that utilizes a number with more than 100 digits. To break the code, one needs to factor that large number into two smaller numbers. This is an extremely demanding task, and currently can't be done in a reasonable amount of time by even the world's most state-of-the-art supercomputers. However, a mathematical breakthrough or development of an advanced processor (such as quantum computers which could process many mathematical calculations simultaneously) may eventually be able to crack such a code – instantly causing a threat to privacy and national security by making computer systems insecure.

"Admittedly, that day is probably decades away," says Artur Ekert, a physicist at the University of Oxford in England who conceived of the use of entanglement in quantum cryptography. "But can anyone prove, or give any reliable assurance, that it is? Confidence in the slowness of technological progress is all that the security of the (current) system now rests upon."

In the most basic version of entangled quantum cryptography, a specially prepared crystal splits a single photon into a pair of entangled photons. When this occurs, according to quantum mechanics, the polarization of each photon in undetermined – simultaneously representing a mixture of both 0 and 1. Only when one of the photons is measured, or otherwise disturbed, does it gain a definite polarization and represent a particular value. Whether it becomes a 0 or 1 is completely random, but once its polarization is determined, the other photon is forced to assume a polarization that's correlated with its entangled partner. When using the same detector setting on each end (selected randomly, as well, from a couple of options), sender and receiver get the same polarization – and digit. After receiving a series of entangled photons, sender and receiver can discuss the settings used – rather than the actual readings – over a public channel, like a telephone line or the Internet. After discarding readings made when the sender and receiver weren't using the same settings, they have a randomly generated string of digits that can serve as a completely secure secret key for encoding, and de-coding, the actual message.

According to David DiVincenzo of the IBM Watson Research Center, the technical ability for widespread practical application of entangled cryptography is a long way off. Nevertheless, he says, "this is a small, but notable, step towards qualitatively more powerful forms of long-distance cryptography."

*For copies of the Physical Review Letters papers, contact:Ben SteinAmerican Institute of Physics [email protected]

Randy Atkins -- American Physical Society, 301-209-3238, [email protected]

Author contacts for each of the three papers:

Paul Kwiat -- Los Alamos National Laboratory, Los Alamos, New Mexico, 505-667-6173, [email protected]

Thomas Jennewein -- University of Vienna, Vienna, Austria, 011-43-1-4277-51207 (note: this involved collaboration with the University of Munich, Munich, Germany)

Nicolas Gisin -- University of Geneva, Geneva, Switzerland,011-41 22 702 65 97, [email protected]

Independent sources used in the above release:

Artur Ekert -- University of Oxford, England, [email protected]

David DiVincenzo -- IBM Watson Research Center, Yorktown Heights, New York, 914-945-4421, [email protected]


Story Source:

The above story is based on materials provided by American Institute Of Physics -- Inside Science News Service. Note: Materials may be edited for content and length.


Cite This Page:

American Institute Of Physics -- Inside Science News Service. "You'd Have To Break The Laws Of Physics To Break This Code." ScienceDaily. ScienceDaily, 28 April 2000. <www.sciencedaily.com/releases/2000/04/000427105148.htm>.
American Institute Of Physics -- Inside Science News Service. (2000, April 28). You'd Have To Break The Laws Of Physics To Break This Code. ScienceDaily. Retrieved December 18, 2014 from www.sciencedaily.com/releases/2000/04/000427105148.htm
American Institute Of Physics -- Inside Science News Service. "You'd Have To Break The Laws Of Physics To Break This Code." ScienceDaily. www.sciencedaily.com/releases/2000/04/000427105148.htm (accessed December 18, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Thursday, December 18, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

How 2014 Shaped The Future Of The Internet

How 2014 Shaped The Future Of The Internet

Newsy (Dec. 18, 2014) It has been a long, busy year for Net Neutrality. The stage is set for an expected landmark FCC decision sometime in 2015. Video provided by Newsy
Powered by NewsLook.com
Jaguar Unveils 360 Virtual Windshield Making Car Pillars Appear Transparent

Jaguar Unveils 360 Virtual Windshield Making Car Pillars Appear Transparent

Buzz60 (Dec. 17, 2014) Jaguar unveils a virtual 360 degree windshield that may be the most futuristic automotive development yet. Jen Markham explains. Video provided by Buzz60
Powered by NewsLook.com
BlackBerry Launches Classic Smartphone

BlackBerry Launches Classic Smartphone

AP (Dec. 17, 2014) BlackBerry is returning to its roots with a new smartphone called the Classic, featuring a traditional keyboard at a time when rival Apple and Android phones - and most smartphone customers - have embraced touch screens. (Dec. 17) Video provided by AP
Powered by NewsLook.com
The Future of Work, Skills & Careers in a Digital World-Dr. Tracy Wilen

The Future of Work, Skills & Careers in a Digital World-Dr. Tracy Wilen

Working Mother (Dec. 16, 2014) 2014 Worklife Congress Video provided by Working Mother
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins