Quantum Key Distribution confusion.

In summary, the E91 protocol for Quantum Key Distribution involves Alice and Bob receiving photon pairs with the same circular polarization from an outside source. They use different orientations of their analyzers to measure the polarization and have a shared secret bit for each pair where the orientations were aligned. This secret key can be used to encode information, but it is recommended to use a separate encryption algorithm for added security.
  • #1
Silversonic
130
1
Hey, I'm slightly confused on a part of the process of Quantum Key Distribution (E91 protocol).

I have something which tells me how Alice would send a message to Bob. An atomic transition from an outside source would produce 2 photons both with the same circular polarisation. One of these is sent to Alice, the other to Bob. Alice and Bob have analysers to measure the vertical (V) or horizontal (H) polarization of the photons and they get the same answer with 100% probability (supposing there are no eaves droppers).

They could also measure diagonal (D) and antidiagonal (A) polarisations using a different orientation of their analysers. Alice and Bob change the orientation of their analysers randomly for each photon received.

These are the binary keys;

V (vertical): Binary 1
H: Binary 0

D: Binary 1
A: Binary 0.

So after the outside source sends all the photons, Alice and Bob exchange information on the the orientation of their analysers for each photon pair received to deduce when both of them had the same orientation, but NOT the results of the measurements. So for each photon pair where the orientation of the analysers was aligned the same, Alice and Bob have a shared secret bit (which is the value of whatever polarisation state of the photon they got).

But that's all I'm left with.

So exactly, how has Alice sent a secret message to Bob? All that's happened is they've both been sent a continuous stream of photon pairs, and now they know when BOTH of them had binary 1 and when BOTH of them had binary 0. So after Alice is sent Bob's orientation information for each photon pair, she can deduce the Binary keys for each pair. For example;

Pair 1: 1
Pair 2: 0
Pair 3: -
Pair 4: -
Pair 5: 1
Pair 6: 1
Pair 7: 0
Pair 8: 1
Pair 9: -

"-" corresponds to when Alice and Bob had different orientations and therefore there is no secret key between them. What would happen next? Would Alice then send a subsequent message to Bob saying "Look at Pair 2, 5 and then 8" and then Bob would deduce the secret binary key "011"?Edit: After thought I realize I'm probably right in this assumption. If there was a delete topic button I'd take this down.
 
Last edited:
Physics news on Phys.org
  • #2
The bits where orientations were the same give you a key. How you use the key to encode information is entirely up to you. Keep in mind, however, that different encryption has different security. What you suggest is not terribly strong. Because if you say that bit N of the message is bit K of the key, and later use the same bit K of the key to send bit M of the message, Eve knows that M and N are the same bits without knowing the key. With enough correlations, she can figure out the key and crack the message entirely by cryptography attack that has nothing to do with your key exchange.

What you need is an encryption algorithm that is secure in its own right. Use something like Blowfish or AES with the key you got, and send the encrypted message that way. This way, the complexity of getting the cipher cracked is complexity of corresponding algorithm with key being completely secret. Both of these are considered secure, so combined with quantum key distribution, it gives you a safe communication protocol.
 

1. What is Quantum Key Distribution (QKD)?

Quantum Key Distribution is a method of secure communication that uses principles of quantum mechanics to exchange cryptographic keys between two parties. It ensures the confidentiality and integrity of the keys by exploiting the fundamental properties of quantum particles such as photons.

2. How does QKD work?

QKD involves the transmission of quantum particles (usually photons) over a communication channel between two parties, referred to as Alice and Bob. The particles carry the secret key information in the form of quantum states, which are then measured and compared by Alice and Bob to generate a shared key that can be used for secure communication.

3. Is QKD completely secure?

QKD is considered to be a highly secure method of communication. This is because it relies on the laws of quantum physics, which make it extremely difficult for an attacker to intercept or manipulate the quantum particles without being detected. However, there are still some potential vulnerabilities and practical challenges that need to be addressed.

4. Can QKD be used for long-distance communication?

QKD can be used for long-distance communication, but it is limited by the physical properties of the communication channel. The quantum particles used in QKD can only travel a certain distance before they lose their quantum states and become vulnerable to interception. To overcome this, technologies such as quantum repeaters are being developed to extend the distance of QKD.

5. Is QKD currently being used in real-world applications?

Yes, QKD is currently being used in some real-world applications, such as in government and military communications, financial institutions, and healthcare. However, it is still a relatively new technology and is not yet widely adopted due to its high costs and technological challenges. Research and development are ongoing to make QKD more practical and affordable for broader use.

Similar threads

  • Quantum Physics
2
Replies
38
Views
2K
  • Quantum Physics
Replies
16
Views
2K
Replies
41
Views
2K
Replies
12
Views
2K
  • Quantum Physics
Replies
6
Views
1K
  • Quantum Physics
Replies
1
Views
766
Replies
24
Views
3K
Replies
19
Views
955
  • Quantum Physics
Replies
18
Views
2K
Replies
80
Views
4K
Back
Top