Professional Documents
Culture Documents
Quantum Sciam05
Quantum Sciam05
Quantum Sciam05
By Gary Stix
tum information science, which blends quantum mechanics and information theory.
The ultimate technology to emerge from the field may be a quantum computer so pow-
erful that the only way to protect against its prodigious code-breaking capability may
be to deploy quantum-cryptographic techniques.
The challenge modern cryptographers face is for sender and receiver to share a key
while ensuring that no one has filched a copy. A method called public-key cryptography
w w w. s c ia m . c o m SCIENTIFIC A MERIC A N 79
COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
QUANTUM MECHANICS HIDES A SECRET CODE KEY
Alice and Bob try to keep a quantum-cryptographic key secret
by transmitting it in the form of polarized photons, a scheme
invented by Charles Bennett of IBM and Gilles Brassard of the Photons
University of Montreal during the 1980s and now implemented Rectilinear
in a number of commercial products. polarization
mode
T O M M Y M O O R M A N ; A D A P T E D F R O M T H E C O D E B O O K : T H E S C I E N C E O F S E C R E C Y F R O M A N C I E N T E G Y P T T O Q U A N T U M C RY P T O G R A P H Y, B Y S I M O N S I N G H (1 9 9 9)
wrong filter, she may create errors by modifying
their polarization. 2 Bob
1 Polarization filter
Alice
Transmitted photon
Unpolarized
photon
Detection
filter
Laser
Alice’s bit sequence: 0 0 1 0 1 0 1 1 1
Alice’s filter scheme:
Bob’s detection scheme:
Bob’s bit measurements: 1 0 1 0 1 0 0 1 1
Retained bit sequence (key): — 0 — 0 1 — — 1 1
w w w. s c ia m . c o m SCIENTIFIC A MERIC A N 81
COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.
company that played a critical role in es-
tablishing the Internet. The encryption
keys are sent over dedicated links, and
the messages ciphered with those keys
are transmitted over the Internet. “This
is the first continuously running opera-
tional quantum-cryptography network
outside a laboratory,” notes Chip Elliott
of BBN, who heads the project. The net-
work, designed to merely show that the
technology works, transfers ordinary
unclassified Internet traffic. “The only
secrets I can possibly think of here are
where the parking spaces are,” Elliott
says. Last fall, id Quantique and a part-
ner, the Geneva-based Internet services
provider Deckpoint, put on display a net-
work that allowed a cluster of servers in
Geneva to have its data backed up at a
site 10 kilometers away, with new keys
being distributed frequently through a
quantum-encrypted link.
The current uses for quantum cryp-
tography are in networks of limited geo-
graphic reach. The strength of the tech-
nique — that anyone who spies on a key
transmittal will change it unalterably—
also means that the signals that carry
quantum keys cannot be amplified by
network equipment that restores a
weakening signal and allows it to be re-
layed along to the next repeater. An op-
tical amplifier would corrupt qubits.
To extend the distance of these links,
researchers are looking beyond optical
fibers as the medium to distribute quan-
tum keys. Scientists have trekked to
mountaintops— where the altitude mini-
mizes atmospheric turbulence — to prove
the feasibility of sending quantum keys
ENCRYPTION involving quantum states utilizes Midnight, who took over HBO for more through the air. One experiment in 2002
such advanced technologies that much of the than four minutes in 1986.) Among the at Los Alamos National Laboratory cre-
work still resides in laboratories such as this
one at MagiQ Technologies. prospective customers for quantum- ated a 10-kilometer link. Another, per-
cryptographic systems are telecommu- formed that same year by QinetiQ, based
encrypted message could be captured nications providers that foresee offering in Farnborough, England, and Ludwig
today and stored for a decade or more — customers an ultrasecure service. Maximilian University in Munich,
at which time a quantum computer The first attempts to incorporate stretched 23 kilometers between two
might decipher it. Richard J. Hughes, a quantum cryptography into actual net- mountaintops in the southern Alps. By
researcher in quantum cryptography at works — rather than just point-to-point optimizing this technology—using big-
Los Alamos National Laboratory, cites connections — have begun. The Defense ger telescopes for detection, better filters
other examples of information that Advanced Research Projects Agency has and antireflective coatings —it might be
must remain confidential for a long funded a project to connect six network possible to build a system that could
time: raw census data, the formula for nodes that stretch among Harvard Uni- transmit and receive signals over more
SAM OGDEN
Coca-Cola or the commands for a com- versity, Boston University and BBN than 1,000 kilometers, sufficient to reach
mercial satellite. (Remember Captain Technologies in Cambridge, Mass., a satellites in low earth orbit. A network of
w w w. s c ia m . c o m SCIENTIFIC A MERIC A N 83
COPYRIGHT 2004 SCIENTIFIC AMERICAN, INC.