Quantum cryptography
Feb 22/06
by Nicolle Wahl
For governments and corporations in the business of transmitting sensitive data such as banking records or personal information over fibre optic cables, a new system demonstrated by University of Toronto researchers offers the protective equivalent of a fire-breathing dragon.
The study describes the first experimental proof of a quantum decoy technique to encrypt data over fibre optic cable. In quantum cryptography, laser light particles (photons) carry complex encryption keys through fibre optic cables, dramatically increasing the security of transmitted data. Conventional encryption is based on the assumed complexity of mathematical problems that traditional computers can solve. But quantum cryptography is based on fundamental laws of physics — specifically, Heisenberg’s Uncertainty Principle, which tells us that merely observing a quantum object alters it.
The technique varies the intensity of photons and introduces photonic “decoys,” which were transmitted over a 15-kilometre telecommunication fibre. After the signals are sent, a second broadcast tells the receiving computer which photons carried the signal and which were decoys. If a hacker tries to “eavesdrop” on the data stream to figure out the encryption key, the mere act of eavesdropping changes the decoys — a clear sign to the receiving computer that the data has been tampered with.
The study appears in the Feb. 24 issue of Physical Review Letters and was funded by Connaught, the Natural Sciences and Engineering Research Council of Canada, the Canada Research Chairs program, the Canada Foundation for Innovation, id Quantique, the Ontario Innovation Trust, a Premier’s Research Excellence Award, the Canadian Institute for Photonics Innovations, the Canadian Institute for Advanced Research and the University of Toronto.
(sent to me by Dave Doldersum)
2 Comments:
This comment has been removed by the author.
this maybe true but in the lastest Scientific American there is an articale about possible diamond based processors that might have the power to address any form of encryption. You maybe more knowledgeable about this topic to determine where my statement is true. But from what I've read it is plauible.
Post a Comment
<< Home