Dec12-12, 11:39 AM
Hey, I'm slightly confused on a part of the process of Quantum Key Distribution (E91 protocol).
I have something which tells me how Alice would send a message to Bob. An atomic transition from an outside source would produce 2 photons both with the same circular polarisation. One of these is sent to Alice, the other to Bob. Alice and Bob have analysers to measure the vertical (V) or horizontal (H) polarization of the photons and they get the same answer with 100% probability (supposing there are no eaves droppers).
They could also measure diagonal (D) and antidiagonal (A) polarisations using a different orientation of their analysers. Alice and Bob change the orientation of their analysers randomly for each photon received.
These are the binary keys;
V (vertical): Binary 1
H: Binary 0
D: Binary 1
A: Binary 0.
So after the outside source sends all the photons, Alice and Bob exchange information on the the orientation of their analysers for each photon pair received to deduce when both of them had the same orientation, but NOT the results of the measurements. So for each photon pair where the orientation of the analysers was aligned the same, Alice and Bob have a shared secret bit (which is the value of whatever polarisation state of the photon they got).
But that's all I'm left with.
So exactly, how has Alice sent a secret message to Bob? All that's happened is they've both been sent a continuous stream of photon pairs, and now they know when BOTH of them had binary 1 and when BOTH of them had binary 0. So after Alice is sent Bob's orientation information for each photon pair, she can deduce the Binary keys for each pair. For example;
Pair 1: 1
Pair 2: 0
Pair 3: -
Pair 4: -
Pair 5: 1
Pair 6: 1
Pair 7: 0
Pair 8: 1
Pair 9: -
"-" corresponds to when Alice and Bob had different orientations and therefore there is no secret key between them. What would happen next? Would Alice then send a subsequent message to Bob saying "Look at Pair 2, 5 and then 8" and then Bob would deduce the secret binary key "011"?
Edit: After thought I realise I'm probably right in this assumption. If there was a delete topic button I'd take this down.
Dec12-12, 01:40 PM
The bits where orientations were the same give you a key. How you use the key to encode information is entirely up to you. Keep in mind, however, that different encryption has different security. What you suggest is not terribly strong. Because if you say that bit N of the message is bit K of the key, and later use the same bit K of the key to send bit M of the message, Eve knows that M and N are the same bits without knowing the key. With enough correlations, she can figure out the key and crack the message entirely by cryptography attack that has nothing to do with your key exchange.
What you need is an encryption algorithm that is secure in its own right. Use something like Blowfish or AES with the key you got, and send the encrypted message that way. This way, the complexity of getting the cipher cracked is complexity of corresponding algorithm with key being completely secret. Both of these are considered secure, so combined with quantum key distribution, it gives you a safe communication protocol.
|Register to reply|
|Confusion about quantum foam, quantum gravity and singularities||Quantum Physics||0|
|Probability distribution confusion||Set Theory, Logic, Probability, Statistics||3|
|Current distribution diagram confusion!||Introductory Physics Homework||9|
|Confusion on Poisson and Binomial Distribution||Set Theory, Logic, Probability, Statistics||10|
|Distribution confusion!||Quantum Physics||16|