It looked like just another conference call. A panel of suited men sat at a table, large white name tags and water bottles before them. The man in the center, illuminated by fluorescent lights, spoke to a camera in front of him.
[...] The mics, cameras, and screens made for a seemingly ordinary—maybe even boring—meeting-by-telepresence. But behind the scenes, physicists were encrypting the videostream using arguably the most secure technology in existence. Bai and his colleagues were participating on the first-ever intercontinental, quantum-encrypted video conference.
And on Friday, the Chinese and Austrian researchers who engineered the call published how they did it in Physical Review Letters. Led by physicist Jian-Wei Pan of the University of Science and Technology of China, the team relied on networks of optical fiber, a handful of encryption algorithms, and a $100 million satellite that China launched in 2016—the only one specifically designed for quantum cryptography. "They've demonstrated a full infrastructure," says Caleb Christensen, the chief scientist at MagiQ Technologies, which makes quantum cryptography systems that connect a small number of users. "They've connected all the links. Nobody's done that with [quantum encryption] ever."
Story at: Wired
(Score: 2) by tekk on Monday January 22 2018, @02:09PM (3 children)
Of course, the problem with OTP is that the key has to be as long as the message, which makes it impractical for just about anything.
(Score: 0) by Anonymous Coward on Monday January 22 2018, @04:46PM
No, the length of the pad isn't what makes it impractical.
You can break up a message into blocks of whatever size you want and you could apply a new pad for each block.
The impracticality of one time pads lies with the transmission of the pad itself.
How do you transmit the pad to use securely? It has to be encrypted... using some other encryption method.
(Score: 2) by maxwell demon on Monday January 22 2018, @07:33PM (1 child)
That's not a problem if you can non-locally generate the key on the fly. Which is exactly what the quantum part provides.
The Tao of math: The numbers you can count are not the real numbers.
(Score: 0) by Anonymous Coward on Tuesday January 23 2018, @09:14PM
Correct, the tricky part is transmitting to the message sender the pad (or if you prefer to call it key) *securely.*
My point was that the length of the pad having to match the length of the message is **not** the fundamental block to everyone using one time pad encryption.
It is the secure transmission of the pad (key) that is the obstacle.
Public key encryption is the worldwide standard because it doesn't have this problem.