Category: 

What is Quantum Cryptography?

Article Details
  • Written By: Mary McMahon
  • Edited By: O. Wallace
  • Last Modified Date: 30 August 2016
  • Copyright Protected:
    2003-2016
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
Roughly one-fifth of the world's stock of gold - worth over $200 billion USD - is stored under the streets of London.  more...

September 30 ,  1949 :  The Berlin Air Lift ended.  more...

Quantum cryptography is a form of cryptography which relies on the principles of quantum mechanics to secure data and detect eavesdropping. Like all forms of cryptography, quantum cryptography is potentially breakable, but it is theoretically extremely reliable, which could make it suitable for very sensitive data. Unfortunately, it also requires the possession of some very specialized equipment, which could hinder the spread of quantum cryptography.

Cryptography involves the exchange of coded messages. The sender and the recipient have the ability to decode the messages, thereby determining the content. The key and the message are generally sent separately, as one is useless without the other. In the case of quantum cryptography, or quantum key distribution (QKD) as it is sometimes known, quantum mechanics are involved in the generation of the key to make it private and secure.

Quantum mechanics is an extremely complex field, but the important thing to know about it in relationship to cryptography is that the observation of something causes a fundamental change in it, which is key to the way in which quantum cryptography works. The system involves the transmission of photons which are sent through polarized filters, and the reception of the polarized photons on the other side, with the use of a corresponding set of filters to decode the message. Photons make an excellent tool for cryptography, since they can be assigned a value of 1 or 0 depending on their alignment, creating binary data.

Ad

Sender A would start the exchange of data by sending a series of randomly polarized photons which could be polarized rectilinearly, causing either a vertical or horizontal orientation, or diagonally, in which case the photon would slant one way or the other. These photons would arrive at recipient B, who would use a randomly assigned series of rectilinear or diagonal filters to receive the message. If B used the same filter that A did for a particular photon, the alignment would match, but if he or she did not, the alignment would be different. Next, the two would exchange information about the filters they used, discarding photons which did not match and keeping those that did to generate a key.

When the two exchange information to generate a shared key, they may be disclosing the filters that they use, but they do not disclose the alignment of the protons involved. This means that this public information cannot be used to decode the message, since an eavesdropper would lack a critical part of the key. More critically, the exchange of information would also reveal the presence of an eavesdropper, C. If C wants to eavesdrop to obtain the key, he or she will need to intercept and observe the protons, thereby altering them and alerting A and B to the presence of an eavesdropper. The two can simply repeat the process to generate a new key.

Once a key is generated, an encryption algorithm can be used to generate a message which can be sent securely over a public channel, since it is encrypted.

Ad

You might also Like

Recommended

Discuss this Article

anon88199
Post 4

They've come a long way from the days of substitution ciphers.

averageD
Post 3

Tootie, I'm with you. That was a lot of information to take in. But it wasn't so bad if you read it twice.

vanstootie
Post 2

Wonder if Osama Bin Laden can do this from the cave? No wonder we can't find him!!

graciegirl
Post 1

I'm sure that the explanation was good, but trying to understand the photon stuff made my head hurt.

Post your comments

exception 'Exception' with message 'error writing captcha: Duplicate entry '2147483647' for key 'PRIMARY'' in /ssd/www/wisegeek/public_html/_core/classes/public/Captcha.php:44
Stack trace:
#0 /ssd/www/wisegeek/public_html/_core/controls/public/ControlDiscussionPostBox.php(324): Captcha->createCaptcha()
#1 /ssd/www/wisegeek/public_html/framework/classes/Control.php(104): ControlDiscussionPostBox->preRender(false)
#2 /ssd/www/wisegeek/public_html/framework/classes/Control.php(149): Control->render()
#3 /ssd/www/wisegeek/public_html/tpl/default-nocustom-lu/pages/public/article/article.htm(526): Control->__toString()
#4 /ssd/www/wisegeek/public_html/framework/classes/Control.php(300): require('/ssd/www/wisege...')
#5 /ssd/www/wisegeek/public_html/framework/classes/Control.php(309): Control->requireTpl('pages/public/ar...', Object(PageArticleCom), true)
#6 /ssd/www/wisegeek/public_html/framework/classes/Control.php(131): Control->renderTpl('pages/public/ar...', Object(PageArticleCom))
#7 /ssd/www/wisegeek/public_html/framework/classes/FormDataControl.php(87): Control->renderTemplate()
#8 /ssd/www/wisegeek/public_html/framework/classes/Control.php(109): FormDataControl->renderTemplate()
#9 /ssd/www/wisegeek/public_html/framework/classes/ScriptPage.php(50): Control->render(false)
#10 /ssd/www/wisegeek/public_html/framework/classes/Control.php(149): ScriptPage->render()
#11 /ssd/www/wisegeek/public_html/framework/classes/Page.php(97): Control->__toString()
#12 /ssd/www/wisegeek/public_html/_core/classes/public/PublicFrontController.php(443): Page->processRequest()
#13 /ssd/www/wisegeek/public_html/_core/classes/public/PublicFrontController.php(7): PublicFrontController->renderPage()
#14 /ssd/www/wisegeek/public_html/index.php(11): PublicFrontController::run()
#15 {main}