[14149] in cryptography@c2.net mail archive
Re: Uncrackable beams of light
daemon@ATHENA.MIT.EDU (h1kari)
Thu Sep 11 08:32:56 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 10 Sep 2003 23:38:38 -0700
Cc: Clippable <rahettinga@earthlink.net>, cryptography@metzdowd.com
To: "R. A. Hettinga" <rah@shipwright.com>
From: h1kari <h1kari@dachb0den.com>
In-Reply-To: <p06002030bb83daad4d29@[66.149.49.6]>
At toorcon this year there will be a talk on quantum cryptography along =20=
with a demonstration of some experimental quantum crypto hardware on =20
loan from a company in switzerland. Also, there's going to be a really =20=
good keynote talk by Bruce Schneier of Counterpane and quite a few =20
others that look pretty promising (Robert X. Cringely, Cory Doctorow, =20=
Seth Hardy, etc..). Check out http://www.toorcon.org for more details =20=
;-).
-h1kari
On Tuesday, Sep 9, 2003, at 19:09 US/Pacific, R. A. Hettinga wrote:
> <http://www.economist.com/science/tq/=20
> PrinterFriendly.cfm?Story_ID=3D2020013>
>
> The Economist
>
>
>
>
>
>
> MONITOR
>
> Uncrackable beams of light
> Sep 4th 2003
>> =46rom The Economist print edition
>
>
> Quantum cryptography=B1hailed by theoreticians as the ultimate of =20
> uncrackable
> codes=B1is finally going commercial
>
> IN THE 1992 film 1=8E4Sneakers1=8E2, the ostensible research topic of =
one =20
> of
> the main characters was something called 1=8E4setec astronomy1=8E2. =
This =20
> was an
> anagram of the words 1=8E4too many secrets1=8E2. The research was =
supposed =20
> to
> be about developing a method for decoding all existing encryption =20
> codes.
> Well, if that were ever the case, it certainly isn't any more=B1thanks =
=20
> to a
> start-up in Somerville, Massachusetts, called Magi Q.
>
> Magi Qis in the final stages of testing a system for quantum =20
> cryptography,
> which it plans to release commercially within the next few months.
> Encryption engineers have long waxed lyrical about quantum =20
> cryptography,
> but this is among the very first commercial implementations. The =20
> advantage
> of quantum cryptography schemes is that the code they generate are =20
> simply
> not=B1even in theory=B1breakable.
>
> The scheme devised by Magi Q, called Navajo, does not use quantum =20
> effects
> to transmit the secret data. Instead, it is the keys used to encrypt =20=
> the
> data that rely on quantum theory. If these keys are changed frequently =
=20
> (up
> to 1,000 times a second in Navajo's case), the risk that an =20
> eavesdropper
> without the key would be able to decrypt the data can be proved
> mathematically to be zero. Of course, given the key, the task would =20=
> become
> a trivial one.
>
> Navajo transmits the changing key sequence over a secure fibre-optic =20=
> link
> as a stream of polarised photons (indivisible particles of light). =20
> Because
> the polarisation reflects the amount of electro-magnetic radiation =20
> allowed
> to radiate at an angle to a light beam's direction, it can be =20
> considered to
> be a measure of the angular dependence of the light.
>
> Should an eavesdropper tap into the secure fibre-optic line, he would
> disrupt this stream of polarised photons by the very act of observing
> them=B1and the tampering could be instantly detected. By changing the =
key
> frequently, Navajo could turn an off-the-shelf encryption scheme such =20=
> as
> AES (Advanced Encryption System) into something that was essentially
> uncrackable.
>
> As in all good encryption schemes, Navajo employs an element of =20
> redundancy.
> The sender has two random-number generators. The first is used to =20
> generate
> a random stream of zeros and ones=B1part of which will form the key. =
The
> second random-number generator chooses which 1=8E4polarisation =
basis1=8E2 =20
> the
> sender will use to transmit a given bit of the key. The sender uses =
two
> different polarisation bases, which are at right-angles to one =
another.
> Only by measuring in the correct polarisation basis can a receiver see
> which bit was sent=B1otherwise the result is meaningless.
>
> For each bit, the receiver arbitrarily chooses which polarisation =20
> basis to
> use. The sender and receiver then talk over an open channel and find =20=
> out
> which bits they measured using the same basis. These bits (about half =20=
> of
> the total) then constitute the key. If someone has been eavesdropping, =
=20
> some
> of these bits will have been disrupted. In that case the receiver will =
=20
> be
> unable to decode the message, and will thus conclude that someone is
> listening in.
>
> This much is standard quantum cryptography. What is harder is building =
=20
> the
> hardware that can do it quickly and cheaply enough to be commercially
> viable. Magi Qis in a race with a Swiss company called ID Quantique to =
=20
> be
> the first to do so, and currently appears to be in the lead.
>
> Of course, if the quantum signal could be transmitted wirelessly, it =20=
> would
> liberate users from the cost and constraints of a fibre-optic line. =
Bob
> Gelfond, Magi Q's founder and chief executive, is coy about the
> possibility. He admits that his firm is working on the idea, but is =
not
> saying anything at the moment.
>
> For the time being, Navajo requires a dedicated fibre-optic link, =
which
> only large corporations or governments are likely to have. And it =20
> currently
> works only at distances of up to 50 kilometres. Any longer than that =20=
> and
> random interference degrades the stream of photons and makes them =20
> unusable.
> But within these constraints, Navajo is fairly cheap. Magi Qplans to =20=
> sell
> it for $50,000 a set.
>
> Given the glut of unused optical fibre buried beneath the streets of =20=
> the
> world, Magi Qis optimistic about Navajo's prospects. Andrew Hammond, a
> vice-president at the company, reckons the market could potentially be
> worth more than $1 billion a year, with much of the business coming =20=
> from
> firms with valuable intellectual property, such as drugmakers and =20
> aircraft
> companies.
>
>
>
> Copyright ' 2003 The Economist Newspaper and The Economist Group. All
> rights reserved.
>
>
>
> --=20
> -----------------
> R. A. Hettinga <mailto: rah@ibuc.com>
> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
> 44 Farquhar Street, Boston, MA 02131 USA
> "... however it may deserve respect for its usefulness and antiquity,
> [predicting the end of the world] has not been found agreeable to
> experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
>
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to =20
> majordomo@metzdowd.com
>
>
>
--
h1kari <h1kari@dachb0den.com>
Senior Researcher, Dachb0den Labs
http://www.dachb0den.com
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com