Quantum Sciam05

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

CREDIT

78 SCIENTIFIC A MERIC A N JANUARY 2005


COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
BEST-KEPT
SECRETS
Quantum cryptography has marched from theory
to laboratory to real products

By Gary Stix

t the IBM Thomas J. Watson Research Laboratory, Charles Bennett is known

A as a brilliant theoretician— one of the fathers of the emerging field of quan-


tum computing. Like many theorists, he has not logged much experience in
the laboratory. His absentmindedness in relation to the physical world once
transformed the color of a teapot from green to red when he left it on a
double boiler too long. But in 1989 Bennett and colleagues John A. Smolin
and Gilles Brassard cast caution aside and undertook a groundbreaking experiment that
would demonstrate a new cryptography based on the principles of quantum mechanics.
The team put together an experiment in which photons moved down a 30-centime-
ter channel in a light-tight box called “Aunt Martha’s coffi n.” The direction in which
the photons oscillated, their polarization, represented the 0s or 1s of a series of quantum
bits, or qubits. The qubits constituted a cryptographic “key” that could be used to en-
crypt or decipher a message. What kept the key from prying eavesdroppers was Heisen-
berg’s uncertainty principle — a foundation of quantum physics that dictates that the
measurement of one property in a quantum state will perturb another. In a quantum
cryptographic system, any interloper tapping into the stream of photons will alter them
in a way that is detectable to the sender and the receiver. In principle, the technique
provides the makings of an unbreakable cryptographic key.
Today quantum cryptography has come a long way from the jury-rigged project
assembled on a table in Bennett’s office. The National Security Agency or one of the
Federal Reserve banks can now buy a quantum-cryptographic system from two small
companies — and more products are on the way. This new method of encryption repre-
sents the fi rst major commercial implementation for what has become known as quan-
JE AN-FR ANCOIS PODE VIN

tum information science, which blends quantum mechanics and information theory.
The ultimate technology to emerge from the field may be a quantum computer so pow-
erful that the only way to protect against its prodigious code-breaking capability may
be to deploy quantum-cryptographic techniques.
The challenge modern cryptographers face is for sender and receiver to share a key
while ensuring that no one has filched a copy. A method called public-key cryptography

w w w. s c ia m . c o m SCIENTIFIC A MERIC A N 79
COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
QUANTUM MECHANICS HIDES A SECRET CODE KEY
Alice and Bob try to keep a quantum-cryptographic key secret
by transmitting it in the form of polarized photons, a scheme
invented by Charles Bennett of IBM and Gilles Brassard of the Photons
University of Montreal during the 1980s and now implemented Rectilinear
in a number of commercial products. polarization
mode

1 To begin creating a key, Alice sends a photon


through either the 0 or 1 slot of the
rectilinear or diagonal polarizing filters, while
Diagonal
polarization
making a record of the various orientations. mode

2 For each incoming bit, Bob chooses


randomly which filter slot he uses for
detection and writes down both the polarization
Established bit value 0 1

and the bit value.

3 If Eve the eavesdropper tries to spy on


the train of photons, quantum mechanics
3 Eve
Detection
prohibits her from using both filters to detect filter
the orientation of a photon. If she chooses the

T O M M Y M O O R M A N ; A D A P T E D F R O M T H E C O D E B O O K : T H E S C I E N C E O F S E C R E C Y F R O M A N C I E N T E G Y P T T O Q U A N T U M C RY P T O G R A P H Y, B Y S I M O N S I N G H (1 9 9 9)
wrong filter, she may create errors by modifying
their polarization. 2 Bob

1 Polarization filter
Alice
Transmitted photon

Unpolarized
photon
Detection
filter

Laser
Alice’s bit sequence: 0 0 1 0 1 0 1 1 1
Alice’s filter scheme:
Bob’s detection scheme:
Bob’s bit measurements: 1 0 1 0 1 0 0 1 1
Retained bit sequence (key): — 0 — 0 1 — — 1 1

4 After all the photons have reached Bob,


he tells Alice over a public channel,
perhaps by telephone or an e-mail, the 4
sequence of filters he used for the incoming Alice Bob
photons, but not the bit value of the photons.

5 Alice tells Bob during the same


conversation which filters he chose
correctly. Those instances constitute the
bits that Alice and Bob will use to form the
key that they will use to encrypt messages.
5

80 SCIENTIFIC A MERIC A N JANUARY 2005


COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
is often used to distribute the secret keys
for encryption and decoding of a full- WHO SELLS “UNBREAKABLE” KEYS
length message. The security of public- COMPANY TECHNOLOGY
key cryptography depends on factoriza-
id Quantique An optical-fiber-based system sends quantum-
tion or other difficult mathematical
Geneva, Switzerland cryptographic keys over tens of kilometers
problems. It is easy to compute the prod-
uct of two large numbers but extremely MagiQ Technologies An optical-fiber system sends quantum-cryptographic
hard to factor it back into the primes. New York City keys up to 100 kilometers; also includes hardware and
The popular RSA cipher algorithm, software for integration into existing networks
widely deployed in public-key cryptogra- NEC Scheduled to release an optical-fiber product at the
phy, relies on factorization. The secret Tokyo earliest next year after a 2004 demonstration that
key being transferred between sender transferred keys over a record 150 kilometers
and receiver is encrypted with a publicly QinetiQ Provides systems on a contract basis that transfer keys
available key, say, a large number such as Farnborough, England through the air at distances up to 10 kilometers; has
408,508,091 (in practice, the number supplied a system to BBN Technologies in Cambridge, Mass.
would be much larger). It can be decrypt-
ed only with a private key owned by the The sender, whom cryptographers by Heisenberg. If she makes the measure-
recipient of the data, made up of two fac- convention call Alice, sends a string of ments in the wrong mode, even if she re-
tors, in this case 18,313 and 22,307. bits, choosing randomly to send photons sends the bits to Bob in the same way she
The difficulty of overcoming a pub- in either the rectilinear or the diagonal measured them, she will inevitably intro-
lic-key cipher may hold secret keys se- modes. The receiver, known as Bob in duce errors. Alice and Bob can detect the
cure for a decade or more. But the advent crypto-speak, makes a similarly random presence of the eavesdropper by compar-
of the quantum information era— and, decision about which mode to measure ing selected bits and checking for errors.
in particular, the capability of quantum the incoming bits. The Heisenberg un- Beginning in 2003, two companies—
computers to rapidly perform mon- certainty principle dictates that he can id Quantique in Geneva and MagiQ
strously challenging factorizations — measure the bits in only one mode, not Technologies in New York City— intro-
may portend the eventual demise of RSA both. Only the bits that Bob measured in duced commercial products that send a
and other cryptographic schemes. “If the same mode as sent by Alice are guar- quantum-cryptographic key beyond the

The arrival of the quantum computer


may portend the EVENTUAL DEMISE OF CIPHERS
based on factorization.
quantum computers become a reality, anteed to be in the correct orientation, 30 centimeters traversed in Bennett’s ex-
the whole game changes,” says John thus retaining the proper value [see box periment. And, after demonstrating a
Rarity, a professor in the department of on opposite page]. record transmission distance of 150 kilo-
electrical and electronics engineering at After transmission, Bob then com- meters, NEC is to come to market with a
the University of Bristol in England. municates with Alice, an exchange that product at the earliest next year. Others,
Unlike public-key cryptography, need not remain secret, to tell her which such as IBM, Fujitsu and Toshiba, have
quantum cryptography should remain of the two modes he used to receive each active research efforts [see table above].
secure when quantum computers arrive photon. He does not, however, reveal the The products on the market can send
on the scene. One way of sending a quan- 0- or 1-bit value represented by each pho- keys over individual optical-fiber links
tum-cryptographic key between sender ton. Alice then tells Bob which of the for multiple tens of kilometers. A system
and receiver requires that a laser trans- modes were measured correctly. They from MagiQ costs $70,000 to $100,000.
mit single photons that are polarized in both ignore photons that were not ob- “A small number of customers are using
one of two modes. In the fi rst, photons served in the right mode. The modes and testing the system, but it’s not wide-
are positioned vertically or horizontally measured correctly constitute the key ly deployed in any network,” comments
(rectilinear mode); in the second, they that serves as an input for an algorithm Robert Gelfond, a former Wall Street
are oriented 45 degrees to the left or used to encrypt or decipher a message. quantitative trader who in 1999 found-
right of vertical (diagonal mode). In ei- If someone tries to intercept this ed MagiQ Technologies.
ther mode, the opposing positions of the stream of photons — call her Eve — she Some government agencies and fi -
photons represent either a digital 0 or a 1. cannot measure both modes, thanks to nancial institutions are afraid that an

w w w. s c ia m . c o m SCIENTIFIC A MERIC A N 81
COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
company that played a critical role in es-
tablishing the Internet. The encryption
keys are sent over dedicated links, and
the messages ciphered with those keys
are transmitted over the Internet. “This
is the first continuously running opera-
tional quantum-cryptography network
outside a laboratory,” notes Chip Elliott
of BBN, who heads the project. The net-
work, designed to merely show that the
technology works, transfers ordinary
unclassified Internet traffic. “The only
secrets I can possibly think of here are
where the parking spaces are,” Elliott
says. Last fall, id Quantique and a part-
ner, the Geneva-based Internet services
provider Deckpoint, put on display a net-
work that allowed a cluster of servers in
Geneva to have its data backed up at a
site 10 kilometers away, with new keys
being distributed frequently through a
quantum-encrypted link.
The current uses for quantum cryp-
tography are in networks of limited geo-
graphic reach. The strength of the tech-
nique — that anyone who spies on a key
transmittal will change it unalterably—
also means that the signals that carry
quantum keys cannot be amplified by
network equipment that restores a
weakening signal and allows it to be re-
layed along to the next repeater. An op-
tical amplifier would corrupt qubits.
To extend the distance of these links,
researchers are looking beyond optical
fibers as the medium to distribute quan-
tum keys. Scientists have trekked to
mountaintops— where the altitude mini-
mizes atmospheric turbulence — to prove
the feasibility of sending quantum keys
ENCRYPTION involving quantum states utilizes Midnight, who took over HBO for more through the air. One experiment in 2002
such advanced technologies that much of the than four minutes in 1986.) Among the at Los Alamos National Laboratory cre-
work still resides in laboratories such as this
one at MagiQ Technologies. prospective customers for quantum- ated a 10-kilometer link. Another, per-
cryptographic systems are telecommu- formed that same year by QinetiQ, based
encrypted message could be captured nications providers that foresee offering in Farnborough, England, and Ludwig
today and stored for a decade or more — customers an ultrasecure service. Maximilian University in Munich,
at which time a quantum computer The first attempts to incorporate stretched 23 kilometers between two
might decipher it. Richard J. Hughes, a quantum cryptography into actual net- mountaintops in the southern Alps. By
researcher in quantum cryptography at works — rather than just point-to-point optimizing this technology—using big-
Los Alamos National Laboratory, cites connections — have begun. The Defense ger telescopes for detection, better filters
other examples of information that Advanced Research Projects Agency has and antireflective coatings —it might be
must remain confidential for a long funded a project to connect six network possible to build a system that could
time: raw census data, the formula for nodes that stretch among Harvard Uni- transmit and receive signals over more
SAM OGDEN

Coca-Cola or the commands for a com- versity, Boston University and BBN than 1,000 kilometers, sufficient to reach
mercial satellite. (Remember Captain Technologies in Cambridge, Mass., a satellites in low earth orbit. A network of

82 SCIENTIFIC A MERIC A N JANUARY 2005


COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
satellites would allow for worldwide cov- are sent along to a subsequent link. “This to help decode a message. A software al-
erage. The European Space Agency is in is still very much in its infancy. It’s still in gorithm, known as privacy amplifica-
the early stages of putting together a plan the hands of physics laboratories,” notes tion, helps to guard against this possibil-
for an earth-to-satellite experiment. (The Nicolas Gisin, a professor at the Univer- ity by masking the values of the qubits.
European Union also launched an effort sity of Geneva, who helped to found id But cryptographers would like to
in April to develop quantum encryption Quantique and who has also done exper- have better photon sources and detec-
over communications networks, an ef- iments on long-distance entanglement. tors. The National Institute of Standards
fort spurred in part by a desire to prevent A quantum memory might be best and Technology (NIST) is one of many
eavesdropping by Echelon, a system that implemented with atoms, not photons. groups laboring on these devices. “One
intercepts electronic messages for the in- An experiment published in the October very interesting area is the development
telligence services of the U.S., Britain and 22 issue of Science showed how this of detectors that can tell the difference
other nations.) might work. Building on ideas of re- between one, two or more photons ar-
Ultimately cryptographers want searchers from the University of Inns- riving at the same time,” says Alan
some form of quantum repeater— in es- bruck in Austria, a group at the Georgia Migdall of NIST. Researchers there have
sence, an elementary form of quantum Institute of Technology detailed in the also tried to address the problem of slow
computer that would overcome distance paper how two clouds of ultracold ru- transmission speed by generating quan-
limitations. A repeater would work bidium atoms could be entangled and, tum keys at a rate of one megabit per
through what Albert Einstein famously because of the quantum linkage, could second—100 times faster than any previ-
called “spukhafte Fernwirkungen,” be inscribed with a qubit, the clouds ous efforts and enough to distribute keys
spooky action at a distance. Anton Zeil- storing the qubit for much longer than a for video applications.
inger and his colleagues at the Institute photon can. The experiment then trans- Quantum cryptography may still
of Experimental Physics in Vienna, Aus- ferred the quantum state of the atoms, prove vulnerable to some unorthodox
tria, took an early step toward a repeater their qubit, onto a photon, constituting attacks. An eavesdropper might sabo-
when they reported in the August 19, information transfer from matter to tage a receiver’s detector, causing qubits
2004, issue of Nature that their group light and showing how a quantum mem- received from a sender to leak back into
had strung an optical-fiber cable in a ory might output a bit. By entangling a fiber and be intercepted. And an inside
sewer tunnel under the Danube River clouds, Alex Kuzmich and Dzmitry job will always prove unstoppable.

Entanglement SPOOKED EINSTEIN, but


researchers have used the phenomenon
to “TELEPORT” quantum information.
and stationed an “entangled” photon at Matsukevich of Georgia Tech hope to “Treachery is the primary way,” ob-
each end. The measurement of the state create repeaters that can transfer qubits serves Seth Lloyd, an expert in quantum
of polarization in one photon (horizon- over long distances. computation at the Massachusetts Insti-
tal, vertical, and so on) establishes im- The supposed inviolability of quan- tute of Technology. “There’s nothing
mediately an identical polarization that tum cryptography rests on a set of as- quantum mechanics can do about that.”
can be measured in the other. sumptions that do not necessarily carry Still, in the emerging quantum informa-
Entanglement spooked Einstein, but over into the real world. One of those tion age, these new ways of keeping se-
Zeilinger and his team took advantage of assumptions is that only a single photon crets may be better than any others in
a link between two entangled photons to represents each qubit. Quantum cryp- the codebooks.
“teleport” the information carried by a tography works by taking a pulsed laser
third photon a distance of 600 meters and diminishing its intensity to such an MORE TO EXPLORE
across the Danube. Such a system might extent that typically it becomes unlikely Quantum Cryptography. Charles H. Bennett,
be extended in multiple relays, so that the that any more than one in 10 pulses con- Gilles Brassard and Artur K. Ekert
in Scientific American, Vol. 267, No. 4,
qubits in a key could be transmitted tains a photon— the rest are dark— one pages 50–57; October 1992.
across continents or oceans. To make this reason that the data transfer rate is so The Code Book. Simon Singh.
a reality will require development of eso- low. But this is only a statistical likeli- Anchor Books, 1999.
teric components, such as a quantum hood. The pulse may have more than Information about quantum-cryptographic
products can be found at the Web sites of
memory capable of actually storing qu- one photon. An eavesdropper could, in id Quantique (idquantique.com) and MagiQ
bits without corrupting them before they theory, steal an extra photon and use it Technologies (magiqtech.com).

w w w. s c ia m . c o m SCIENTIFIC A MERIC A N 83
COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.

You might also like