Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 17 submissions in the queue.
posted by martyb on Sunday January 21 2018, @09:02PM   Printer-friendly
from the I-do-NOT-see-what-you-did-there dept.

It looked like just another conference call. A panel of suited men sat at a table, large white name tags and water bottles before them. The man in the center, illuminated by fluorescent lights, spoke to a camera in front of him.

[...] The mics, cameras, and screens made for a seemingly ordinary—maybe even boring—meeting-by-telepresence. But behind the scenes, physicists were encrypting the videostream using arguably the most secure technology in existence. Bai and his colleagues were participating on the first-ever intercontinental, quantum-encrypted video conference.

And on Friday, the Chinese and Austrian researchers who engineered the call published how they did it in Physical Review Letters. Led by physicist Jian-Wei Pan of the University of Science and Technology of China, the team relied on networks of optical fiber, a handful of encryption algorithms, and a $100 million satellite that China launched in 2016—the only one specifically designed for quantum cryptography. "They've demonstrated a full infrastructure," says Caleb Christensen, the chief scientist at MagiQ Technologies, which makes quantum cryptography systems that connect a small number of users. "They've connected all the links. Nobody's done that with [quantum encryption] ever."

Story at: Wired


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by tekk on Monday January 22 2018, @02:09PM (3 children)

    by tekk (5704) Subscriber Badge on Monday January 22 2018, @02:09PM (#626066)

    Of course, the problem with OTP is that the key has to be as long as the message, which makes it impractical for just about anything.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Monday January 22 2018, @04:46PM

    by Anonymous Coward on Monday January 22 2018, @04:46PM (#626126)

    No, the length of the pad isn't what makes it impractical.
    You can break up a message into blocks of whatever size you want and you could apply a new pad for each block.
    The impracticality of one time pads lies with the transmission of the pad itself.
    How do you transmit the pad to use securely? It has to be encrypted... using some other encryption method.

  • (Score: 2) by maxwell demon on Monday January 22 2018, @07:33PM (1 child)

    by maxwell demon (1608) on Monday January 22 2018, @07:33PM (#626199) Journal

    That's not a problem if you can non-locally generate the key on the fly. Which is exactly what the quantum part provides.

    --
    The Tao of math: The numbers you can count are not the real numbers.
    • (Score: 0) by Anonymous Coward on Tuesday January 23 2018, @09:14PM

      by Anonymous Coward on Tuesday January 23 2018, @09:14PM (#626761)

      Correct, the tricky part is transmitting to the message sender the pad (or if you prefer to call it key) *securely.*
      My point was that the length of the pad having to match the length of the message is **not** the fundamental block to everyone using one time pad encryption.
      It is the secure transmission of the pad (key) that is the obstacle.
      Public key encryption is the worldwide standard because it doesn't have this problem.