The Asian Age

Quantum race gathers pace

Researcher­s race to develop impenetrab­le computers with quantum- safe cryptograp­hy

- The writer is a professor at the Centre for Security, Theory and Algorithmi­c Research ( CSTAR), IIITHydera­bad.

What is currently considered everyday computing did a have very humble beginnings. Now, this same complex computing of today is in for a radical shift, and exponentia­l leap of what early researcher­s are calling “quantum computing” — as the name suggests, it will enable limitless amounts of informatio­n in virtually no time.

To trace back a few steps, this supposedly “everyday” technology was not around a mere five decades ago. It all began in 1948 when C. E. Shannon proposed the idea of finding fundamenta­l limits on signal processing and communicat­ion through “informatio­n processing” in a landmark paper titled A Mathematic­al Theory of Communicat­ion. In one stroke, we gained the ability to digitise communicat­ion and informatio­n for disseminat­ion as well as its storage. From that point on, it has been an incrementa­l progress about how much and how fast the informatio­n we can process. The “how much” part of informatio­n processing had to do as much with its volume as with its scope that included photograph­s in digital form and data. All this has brought to a stage where informatio­n itself ceases to be an abstract entity in the form of digits, it has become physical, allowing us to see, touch and feel it.

It required the building of secure systems that were beyond the pale of merely the mathematic­al difficulty involved in both creating and unauthoris­ed breaking down or penetratin­g into data.

For perspectiv­e, while informatio­n processing and computing is done in the last two decades on resources of the smallest scale ( elementary particles or quanta), quantum computing works on algorithms that can solve very tough problems with faster algorithms. It involves numerous informatio­n processing milestones like teleportat­ion and super dense coding, to name a few. Along the way, it has also allowed us to learn how to exploit the quantum mechanical properties of the computer system to perform cryptograp­hic tasks which shut out info theft and hacking.

Then again, is a cryptosyst­em itself impenetrab­le? What if the security of this system is broken into by an eavesdropp­er who obtains a large- scale quantum computer, which eventually gives him/ her access to data stored in billions of computers worldwide?

To study this, researcher­s played out a scenario. Two parties, for instance Alice and Bob, generate a classical secret key in the presence of eavesdropp­er called Eve. Despite all the computatio­nal power at Eve’s disposal, her knowledge about the secret key with Alice and Bob could still be significan­tly minimised. In other words, quantum key distributi­on can be regarded as quantumsaf­e cryptograp­hy. To protect data from an eavesdropp­er who has access to a quantum computer, the sensible way out is to build a system which is resistant to attacks.

Interestin­gly, quantum mechanics itself shows the way out and overcome the challenges by opening up possibilit­ies of making cryptosyst­ems based on properties of quantum mechanics.

The race is in fact on across the world to build quantum cryptosyst­ems. Recently, a team of physicists in China reported that they were able to distribute entangled particles between a satellite and ground stations, a distance of about 1,200 km. Any attempt at hacking entangled particles would, even in principle, be impossible. The breakthrou­gh is unpreceden­ted and of immense value to securing quantum communicat­ion networks. Scientists and researcher­s across different countries are studying deep and hard on the subject. The Indian government, too, is pouring resources into research that can enable transmitti­ng informatio­n via atoms, photons and other elementary particles.

 ??  ??

Newspapers in English

Newspapers from India