Professional Documents
Culture Documents
1 Ecd
1 Ecd
International Journal Of Power System Operation and Energy Management (IJPSOEM) Volume-1, Issue-1, 2011
11
Quantum Cryptography : A New Approach To Information Security
simultaneously knowing the value of the other. In that no one can determine a bit with certainty, because no
particular, when measuring the polarization of a photon, the measurement can distinguish between two nonorthogonal
choice of what direction to measure affects all subsequent quantum states.
measurements. Quantum cryptography, or quantum key
distribution (QKD) [9], uses quantum mechanics to C. Ekert Encoding Scheme:
guarantee secure communication. It enables two parties to
produce a shared random bit string known only to them, The Ekert Scheme was developed by Arthur Ekert in
which can be used as a key to encrypt and decrypt 1991, which uses entangled pairs of photons. These photon
messages. An important and unique property of quantum pairs can be created by sender, receiver or a third party.
cryptography is the ability of the two communicating users These pairs are created by splitting a single photon into
to detect the presence of any third party trying to gain two, using a laser. After the split, one of the photons is sent
knowledge of the key. by the sender or on behalf of the sender to the receiver
while the other photon is kept.
Quantum cryptography is only used to produce and
distribute a key, not to transmit any message data. Quantum
cryptography is different from traditional cryptographic
III. QUANTUM CRYPTOGRAPHY
systems in that it relies more on physics, rather than TECHNOLOGIES
mathematics, as a key aspect of its security model.
Quantum cryptography uses our current knowledge of Experimental implementations of quantum cryptography
physics to develop a cryptosystem that is not able to be have existed since 1990, and today quantum cryptography
defeated - that is, one that is completely secure against is performed over distances of 30-40 kilometers using
being compromised without knowledge of the sender or the optical fibers. Essentially, two technologies make quantum
receiver of the messages. The genius of quantum key distribution possible: the equipment for creating single
cryptography is that it solves the problem of key photons and that for detecting them. The ideal source
distribution. A user can suggest a key by sending a series of is a so-called photon gun that fires a single photon on
photons with random polarizations. This Sequence can then demand. As yet, nobody has succeeded in building a
be used to generate a sequence of numbers. The process is practical photon gun, but several research efforts are under
known as quantum key distribution. If the key is way. Some researchers are working on a light emitting p-n
intercepted by an eavesdropper, this can be detected and it junction that produces well-spaced single photons on
is of no consequence, since it is only a set of random bits demand. Others are working with a diamond-like material
and can be discarded. The sender can then transmit another in which one carbon atom in the structure has been replaced
key. Once a key has been securely received, it can be used with nitrogen. That substitution creates a vacancy similar to
to encrypt a message that can be transmitted by a hole in a type semiconductor, which emits single photons
conventional means: telephone, e-mail, or regular postal when excited by a laser. Many groups are also working on
mail. In the past few years, a remarkable surge of interest ways of making single ions emit single photons. None of
from international scientific and business communities has these technologies, however, is mature enough to be used
propelled QC into mainstream computer science and in current quantum cryptography experiments. As a result,
physics. Furthermore, new developments are making QC physicists have to rely on other techniques that are by no
increasingly practical. The first QC experiment worked means perfect from a security viewpoint. Most common is
over a distance of 32cm in 1989, and today, it is performed the practice of reducing the intensity of a pulsed laser beam
over distances of hundreds of kilometers using optical to such a level that, on average, each pulse contains only a
fibers. single photon.
12
Quantum Cryptography : A New Approach To Information Security
VI. REFERENCES
International Journal Of Power System Operation and Energy Management (IJPSOEM) Volume-1, Issue-1, 2011
13