Researchers simplify quantum cryptography

Powered by SC Magazine
 

Quantum cryptography, the most secure method of transmitting data, has taken a step closer to mainstream viability with a technique that simplifies the distribution of keys..

Researchers at the National Institute of Standards and Technology claim that the new "quantum key distribution" method minimises the required number of detectors, the most costly components in quantum cryptography.

In quantum cryptography, a recipient needs to measure a sequence of photons, or particles of light, transmitted by a sender.

These photons have information encoded in their polarisation, or direction of their electric field.

In the most common polarisation-based protocol, known as BB84, the recipient uses four single-photon detectors, costing approximately US$5,000 - US$20,000 each.

One pair of detectors records photons with horizontal and vertical polarisation, which could indicate zero and one respectively.

The other pair detects photons with 'diagonal', or +/- 45 degree, polarisation in which the 'northeast' and 'northwest' directions alternatively denote zero and one.

In the new method, the researchers, led Xiao Tang, designed an optical component to make the diagonally polarised photons rotate by a further 45 degrees and arrive at the same detector.

However, the photons arrive later, and into a separate "time bin", than the horizontal/vertical polarised ones.

Therefore, one pair of detectors can be used to record information from both kinds of polarised photons in succession, reducing the required number of detectors from four to two.

The boffins concede that their minimum-detector arrangement cuts transmission rates by half, but point out that the system still works at broadband speeds.

This would allow real-time quantum encryption and decryption of webcam-quality video streams over an experimental quantum network, for example.

In another protocol, called BB92, the researchers reduced the required number of detectors from two to one.

And in later work, the researchers further developed their approach so that the popular BB84 method now only requires one detector instead of four.

Copyright ©v3.co.uk


Researchers simplify quantum cryptography
 
 
 
Top Stories
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
Telstra hands over copper, HFC in new $11bn NBN deal
Value of 2011 deal remains intact.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  3%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  7%
 
A retailer (Coles, Woolworths et al)
  2%
 
A Federal Government agency (ATO, Centrelink etc)
  20%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1783

Vote
Do you support the abolition of the Office of the Information Commissioner?