Uncrackable beams of light
h1kari
h1kari at dachb0den.com
Thu Sep 11 02:38:38 EDT 2003
At toorcon this year there will be a talk on quantum cryptography along
with a demonstration of some experimental quantum crypto hardware on
loan from a company in switzerland. Also, there's going to be a really
good keynote talk by Bruce Schneier of Counterpane and quite a few
others that look pretty promising (Robert X. Cringely, Cory Doctorow,
Seth Hardy, etc..). Check out http://www.toorcon.org for more details
;-).
-h1kari
On Tuesday, Sep 9, 2003, at 19:09 US/Pacific, R. A. Hettinga wrote:
> <http://www.economist.com/science/tq/
> PrinterFriendly.cfm?Story_ID=2020013>
>
> The Economist
>
>
>
>
>
>
> MONITOR
>
> Uncrackable beams of light
> Sep 4th 2003
>> From The Economist print edition
>
>
> Quantum cryptography±hailed by theoreticians as the ultimate of
> uncrackable
> codes±is finally going commercial
>
> IN THE 1992 film 1Ž4Sneakers1Ž2, the ostensible research topic of one
> of
> the main characters was something called 1Ž4setec astronomy1Ž2. This
> was an
> anagram of the words 1Ž4too many secrets1Ž2. The research was supposed
> to
> be about developing a method for decoding all existing encryption
> codes.
> Well, if that were ever the case, it certainly isn't any more±thanks
> to a
> start-up in Somerville, Massachusetts, called Magi Q.
>
> Magi Qis in the final stages of testing a system for quantum
> cryptography,
> which it plans to release commercially within the next few months.
> Encryption engineers have long waxed lyrical about quantum
> cryptography,
> but this is among the very first commercial implementations. The
> advantage
> of quantum cryptography schemes is that the code they generate are
> simply
> not±even in theory±breakable.
>
> The scheme devised by Magi Q, called Navajo, does not use quantum
> effects
> to transmit the secret data. Instead, it is the keys used to encrypt
> the
> data that rely on quantum theory. If these keys are changed frequently
> (up
> to 1,000 times a second in Navajo's case), the risk that an
> eavesdropper
> without the key would be able to decrypt the data can be proved
> mathematically to be zero. Of course, given the key, the task would
> become
> a trivial one.
>
> Navajo transmits the changing key sequence over a secure fibre-optic
> link
> as a stream of polarised photons (indivisible particles of light).
> Because
> the polarisation reflects the amount of electro-magnetic radiation
> allowed
> to radiate at an angle to a light beam's direction, it can be
> considered to
> be a measure of the angular dependence of the light.
>
> Should an eavesdropper tap into the secure fibre-optic line, he would
> disrupt this stream of polarised photons by the very act of observing
> them±and the tampering could be instantly detected. By changing the key
> frequently, Navajo could turn an off-the-shelf encryption scheme such
> as
> AES (Advanced Encryption System) into something that was essentially
> uncrackable.
>
> As in all good encryption schemes, Navajo employs an element of
> redundancy.
> The sender has two random-number generators. The first is used to
> generate
> a random stream of zeros and ones±part of which will form the key. The
> second random-number generator chooses which 1Ž4polarisation basis1Ž2
> the
> sender will use to transmit a given bit of the key. The sender uses two
> different polarisation bases, which are at right-angles to one another.
> Only by measuring in the correct polarisation basis can a receiver see
> which bit was sent±otherwise the result is meaningless.
>
> For each bit, the receiver arbitrarily chooses which polarisation
> basis to
> use. The sender and receiver then talk over an open channel and find
> out
> which bits they measured using the same basis. These bits (about half
> of
> the total) then constitute the key. If someone has been eavesdropping,
> some
> of these bits will have been disrupted. In that case the receiver will
> be
> unable to decode the message, and will thus conclude that someone is
> listening in.
>
> This much is standard quantum cryptography. What is harder is building
> the
> hardware that can do it quickly and cheaply enough to be commercially
> viable. Magi Qis in a race with a Swiss company called ID Quantique to
> be
> the first to do so, and currently appears to be in the lead.
>
> Of course, if the quantum signal could be transmitted wirelessly, it
> would
> liberate users from the cost and constraints of a fibre-optic line. Bob
> Gelfond, Magi Q's founder and chief executive, is coy about the
> possibility. He admits that his firm is working on the idea, but is not
> saying anything at the moment.
>
> For the time being, Navajo requires a dedicated fibre-optic link, which
> only large corporations or governments are likely to have. And it
> currently
> works only at distances of up to 50 kilometres. Any longer than that
> and
> random interference degrades the stream of photons and makes them
> unusable.
> But within these constraints, Navajo is fairly cheap. Magi Qplans to
> sell
> it for $50,000 a set.
>
> Given the glut of unused optical fibre buried beneath the streets of
> the
> world, Magi Qis optimistic about Navajo's prospects. Andrew Hammond, a
> vice-president at the company, reckons the market could potentially be
> worth more than $1 billion a year, with much of the business coming
> from
> firms with valuable intellectual property, such as drugmakers and
> aircraft
> companies.
>
>
>
> Copyright ' 2003 The Economist Newspaper and The Economist Group. All
> rights reserved.
>
>
>
> --
> -----------------
> R. A. Hettinga <mailto: rah at ibuc.com>
> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
> 44 Farquhar Street, Boston, MA 02131 USA
> "... however it may deserve respect for its usefulness and antiquity,
> [predicting the end of the world] has not been found agreeable to
> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to
> majordomo at metzdowd.com
>
>
>
--
h1kari <h1kari at dachb0den.com>
Senior Researcher, Dachb0den Labs
http://www.dachb0den.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list