-->

Quantum cryptography breached?

Quantum cryptography has been pushed onto the market as a way to provide absolute security for communications and, as far as we know, no current quantum cryptographic system has been compromised in the field. It is already used in Swiss elections to ensure that electronic vote data is securely transmitted to central locations.

Quantum cryptography relies on the concept of entanglement. With entanglement, some statistical correlations are measured to be larger than those found in experiments based purely on classical physics. Cryptographic security works by using the correlations between entangled photons pairs to generate a common secret key. If an eavesdropper intercepts the quantum part of the signal, the statistics change, revealing the presence of an interloper.

The Swiss general approach can be summed up as follows: if you can fool a detector into thinking a classical light pulse is actually a quantum light pulse, then you might just be able to defeat a quantum cryptographic system. But even then the attack should fail, because quantum entangled states have statistics that cannot be achieved with classical light sources—by comparing statistics, you could unmask the deception.

But there's a catch here. I can make a classical signal that is perfectly correlated to any signal at all, provided I have time to measure said signal and replicate it appropriately. In other words, these statistical arguments only apply when there is no causal connection between the two measurements.

You might think that this makes intercepting the quantum goodness of a cryptographic system easy. But you would be wrong. When Eve intercepts the photons from the transmitting station run by Alice, she also destroys the photons. And even though she gets a result from her measurement, she cannot know the photons' full state. Thus, she cannot recreate, at the single photon level, a state that will ensure that Bob, at the receiving station, will observe identical measurements.


That is the theory anyway. But this is where the second loophole comes into play. We often assume that the detectors are actually detecting what we think they are detecting. In practice, there is no such thing as a single photon, single polarization detector. Instead, what we use is a filter that only allows a particular polarization of light to pass and an intensity detector to look for light. The filter doesn't care how many photons pass through, while the detector plays lots of games to try and be single photon sensitive when, ultimately, it is not. It's this gap between theory and practice that allows a carefully manipulated classical light beam to fool a detector into reporting single photon clicks.

Since Eve has measured the polarization state of the photon, she knows what polarization state to set on her classical light pulse in order to fake Bob into recording the same measurement result. When Bob and Alice compare notes, they get the right answers and assume everything is on the up and up.
The researchers demonstrated that this attack succeeds with standard (but not commercial) quantum cryptography equipment under a range of different circumstances. In fact, they could make the setup outperform the quantum implementation for some particular settings.

(Adapted from ArsTechnica)

1 comment:

mary Brown said...

Quantum cryptography is a groundbreaking field that leverages the principles of quantum mechanics to secure communication. Unlike traditional cryptography, which relies on complex mathematical problems, quantum cryptography guarantees information-theoretic security, meaning it is theoretically impossible to crack.

cyber security projects for students


Key Concepts
Quantum Key Distribution (QKD): The most common form of quantum cryptography, QKD involves the secure distribution of a cryptographic key between two parties.
Quantum Mechanics: Exploits phenomena like superposition and entanglement to ensure security.
Unconditional Security: Unlike classical cryptography, which relies on computational hardness assumptions, QKD offers provable security.
Eavesdropping Detection: Any attempt to intercept the quantum communication is detected, ensuring the integrity of the key.
How QKD Works
Photon Generation: A sender (Alice) generates photons in random polarization states.
Photon Transmission: Photons are sent to the receiver (Bob) through a quantum channel.

Cloud Computing Projects Final Year Projects

Photon Measurement: Bob measures the polarization of the photons.
Key Agreement: Alice and Bob publicly compare their measurement results, discarding any inconsistent measurements. The remaining measurements form the shared secret key.

Information Security Projects For Final Year Students