One Way vs. Entangled Cryptography

In summary: it seems to me that much more attention should be given to developing schemes which are more resistant to classical attacks.
  • #1
Zafa Pi
631
132
In a recent article (I've lost the reference, but it doesn't matter) it said that employing entangled photons is superior to the usual one way transmission of photons from Alice to Bob for creating a one time pad. It gave no justification for this claim. Can anyone provide me with one?
 
Physics news on Phys.org
  • #2
Hi Zafa Pi! Is it something like this you are looking for?

Jennewein et. al, Quantum Cryptography with Entangled Photons,
Phys. Rev. Lett. 84, 4729 – Published 15 May 2000
Abstract:
By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400–800 bits/s with bit error rates around 3%.

On Arxiv:
http://arxiv.org/abs/quant-ph/9912117
http://arxiv.org/pdf/quant-ph/9912117v1.pdf
Paper said:
However, in principle it is always possible to intercept classical key distribution unnoticedly. The recent development of quantum key distribution can cover this major loophole of classical cryptography. It allows Alice and Bob to establish two completely secure keys by transmitting single quanta (qubits) along a quantum channel. The underlying principle of quantum key distribution is that nature prohibits to gain information on the state of a quantum system without disturbing it. Therefore, in appropriately designed schemes, no tapping of the qubits is possible without showing up to Alice and Bob.
 
  • Like
Likes Zafa Pi
  • #3
DennisN said:
Hi Zafa Pi! Is it something like this you are looking for?

Jennewein et. al, Quantum Cryptography with Entangled Photons,
Phys. Rev. Lett. 84, 4729 – Published 15 May 2000
Abstract:
By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400–800 bits/s with bit error rates around 3%.

On Arxiv:
http://arxiv.org/abs/quant-ph/9912117
http://arxiv.org/pdf/quant-ph/9912117v1.pdf
Good looking out, thanks. The only place I see where a comparison is made between the two methods is from your 2nd reference, where they say,

"A range of experiments have demonstrated the feasibility of quantum key distribution, including realizations using the polarization of photons9 or the phase of photons in long interferometers10. These experiments have a common problem: the sources of the photons are attenuated laser pulses which have a non-vanishing probability to contain two or more photons, leaving such systems prone to the so called beam splitter attack11.

Using photon pairs as produced by parametric down conversion allows us to approximate a conditional single photon source12 with a very low probability for generating two pairs simultaneously and a high bit rate13. Moreover, when utilizing entangled photon pairs one immediately profits from the inherent randomness of quantum mechanical observations leading to purely random keys."

I find the notion of profiting from the inherent randomness of quantum mechanical observations a bit of a red herring, since Alice can make random selections just fine.
I also find that the problem of Alice sending a couple of photons at a time worse than the difficulty of reliably employing down conversion surprising. But if they say so I'm in no position to quibble.
So I guess that's it.

BTW, are you the guy on the left or right in your avatar?
 
  • #4
If we had a perfect single-photon source then there's no reason in principle why a QKD protocol using entangled states is superior.

From a practical perspective it's very easy to generate an approximate single-photon source by attenuating a laser beam. This is usually modeled as a coherent state. The problem is that for a given time slot there will be a probability that there will be 2 or more photons - which leads to a vulnerability. In order to limit this probability the attenuation can be increased, but this leads to a lower data rate - which is not great for one time pad applications. I'm guessing that this is the reason why the paper you read would suggest that entanglement based QKD is superior.

However, if one uses decoy states with attenuated coherent sources then the photon splitting attack (based on the possibility of there being two or more photons in a given timeslot) can be thwarted and security restored essentially without compromising key rate.

My own view is that there's far too much emphasis within the QKD community on getting key rates high enough for the one time pad to become a practical proposition. Given the effectiveness and speed of symmetric key crypto (with 256 bits to future-proof against quantum computing) I don't really see that there's much practical benefit except where ultra security is required in aiming for OTP applications.
 
  • Like
Likes Zafa Pi
  • #5
Simon Phoenix said:
If we had a perfect single-photon source then there's no reason in principle why a QKD protocol using entangled states is superior.

From a practical perspective it's very easy to generate an approximate single-photon source by attenuating a laser beam. This is usually modeled as a coherent state. The problem is that for a given time slot there will be a probability that there will be 2 or more photons - which leads to a vulnerability. In order to limit this probability the attenuation can be increased, but this leads to a lower data rate - which is not great for one time pad applications. I'm guessing that this is the reason why the paper you read would suggest that entanglement based QKD is superior.

However, if one uses decoy states with attenuated coherent sources then the photon splitting attack (based on the possibility of there being two or more photons in a given timeslot) can be thwarted and security restored essentially without compromising key rate.

My own view is that there's far too much emphasis within the QKD community on getting key rates high enough for the one time pad to become a practical proposition. Given the effectiveness and speed of symmetric key crypto (with 256 bits to future-proof against quantum computing) I don't really see that there's much practical benefit except where ultra security is required in aiming for OTP applications.
Cool, thanks. Can you explain or give a reference to "the photon splitting attack" and how it's thwarted?
Also you say, "I don't really see that there's much practical benefit except where ultra security is required in aiming for OTP applications" Is that in case aliens have 1000 bit q-computers?:wink:
 
  • #6
Zafa Pi said:
BTW, are you the guy on the left or right in your avatar?
I am a litte bit of both :smile:. I have some of Bender's crude humor and some of Zoidberg's ignorance of biology.
 
  • Like
Likes Zafa Pi

1. What is the difference between one way and entangled cryptography?

One way cryptography is a method of encrypting data that is designed to be easy to implement and difficult to reverse. Entangled cryptography, on the other hand, uses entanglement of quantum particles to encrypt data and is considered to be much more secure.

2. How does one way cryptography work?

In one way cryptography, a mathematical function is used to transform data into a seemingly random string of characters known as a hash. This hash is then used as the encrypted representation of the original data. To decrypt the data, the same function is applied to the hash, resulting in the original data.

3. What are the advantages of using entangled cryptography?

Entangled cryptography offers several advantages over traditional one way cryptography. It is virtually impossible to break, as any attempt to intercept or measure the quantum particles used in the encryption process will cause them to change, making the data unreadable. Additionally, entangled cryptography allows for secure communication over long distances without the risk of interception.

4. Are there any drawbacks to using entangled cryptography?

One drawback of entangled cryptography is that it requires highly specialized and expensive equipment to implement. It also requires a high level of expertise to use and maintain, making it less accessible for everyday use. Additionally, the data encrypted using entangled cryptography may still be susceptible to other types of attacks, such as social engineering or physical theft.

5. Is one way or entangled cryptography more commonly used?

Currently, one way cryptography is more commonly used due to its ease of implementation and lower cost. However, as technology continues to advance, entangled cryptography may become more feasible and widely used, especially for highly sensitive data and communications.

Similar threads

Replies
1
Views
827
Replies
19
Views
2K
Replies
33
Views
2K
  • Quantum Physics
Replies
20
Views
2K
  • Quantum Physics
Replies
4
Views
648
  • Quantum Physics
Replies
18
Views
2K
Replies
24
Views
3K
  • Quantum Physics
Replies
21
Views
3K
Replies
4
Views
2K
  • Quantum Interpretations and Foundations
3
Replies
79
Views
5K
Back
Top