OpenSource For You

Quantum cryptograp­hy

-

Quantum tips and techniques provide far more secure methodolog­ies for various cryptograp­hic tasks facilitati­ng quantum informatio­n theory. Under current commercial communicat­ion systems, it is primarily government bodies and a few high-end security companies that are interested in quantum cryptograp­hic techniques. A few firms have started providing networking solutions formulated on quantum mechanics—for example, Swiss Quantum, MagiQ, etc.

One of the most fundamenta­l aspects of any cryptograp­hic system is the key distributi­on between sender and receiver. Quantum Key Distributi­on (QKD) is one of the most well establishe­d aspects of cryptograp­hy, governed by the laws of physics. In our quantum channel, the sender is Alice and the receiver is Bob. Now, as we have seen earlier, qubits follow the ‘no-cloning’ principle. So, if any eavesdropp­er tries to grasp the state of the qubit (i.e., polarisati­on) during the secret key exchange between Alice and Bob, the victim qubit is destroyed (either its polarisati­on, spin or both) and, hence, the eavesdropp­er is unable to decode the qubit. Bob gets a qubit with a failed checksum (a protocol to check data integrity) and asks Alice for retransmis­sion. Thus, the only overhead is the retransmis­sion of the victim qubit by Alice.

In 1984, Charles Bennett and Gilles Brassarad (BB84) formulated a protocol for quantum key distributi­on. It assumes a quantum channel for key distributi­on and classical channel

Newspapers in English

Newspapers from India