Quantum data locking could provide an efficient and secure alternative to one-time pad encryption (which requires a key at least as long as the message), according to two new papers:
Researchers at the University of Rochester have moved beyond the theoretical in demonstrating that an unbreakable encrypted message can be sent with a key that's far shorter than the message—the first time that has ever been done. Until now, unbreakable encrypted messages were transmitted via a system envisioned by American mathematician Claude Shannon, considered the "father of information theory." Shannon combined his knowledge of algebra and electrical circuitry to come up with a binary system of transmitting messages that are secure, under three conditions: the key is random, used only once, and is at least as long as the message itself. The findings by Daniel Lum, a graduate student in physics, and John Howell, a professor of physics, have been published in the journal Physical Review A.
[...] Let's assume that Alice wants to send an encrypted message to Bob. She uses the machine to generate photons that travel through free space and into a spatial light modulator (SLM) that alters the properties of the individual photons (e.g. amplitude, tilt) to properly encode the message into flat but tilted wavefronts that can be focused to unique points dictated by the tilt. But the SLM does one more thing: it distorts the shapes of the photons into random patterns, such that the wavefront is no longer flat which means it no longer has a well-defined focus. Alice and Bob both know the keys which identify the implemented scrambling operations, so Bob is able to use his own SLM to flatten the wavefront, re-focus the photons, and translate the altered properties into the distinct elements of the message.
Along with modifying the shape of the photons, Lum and the team made use of the uncertainty principle, which states that the more we know about one property of a particle, the less we know about another of its properties. Because of that, the researchers were able to securely lock in six bits of classical information using only one bit of an encryption key—an operation called data locking. "While our device is not 100 percent secure, due to photon loss," said Lum, "it does show that data locking in message encryption is far more than a theory."
2013 paper by Seth Lloyd: Quantum enigma machines
Quantum enigma machine: Experimentally demonstrating quantum data locking (DOI: 10.1103/PhysRevA.94.022315) (DX)
Experimental quantum data locking
Classical correlation can be locked via quantum means--quantum data locking. With a short secret key, one can lock an exponentially large amount of information, in order to make it inaccessible to unauthorized users without the key. Quantum data locking presents a resource-efficient alternative to one-time pad encryption which requires a key no shorter than the message.
(Score: 3, Funny) by jelizondo on Saturday September 10 2016, @12:27AM
Don't trust your data to quantum effects, remember what happened to the Schrödinger cat .-)
It will go from hier ist to ist hier nicht as Schrödinger would put it.
(Score: 2) by davester666 on Monday September 12 2016, @07:37AM
Who cares. It's only a cat. Hell, it could be Schrödinger's Kitten, as long as I can send a picture of my penis to my GF securely encrypted.
(Score: 0) by Anonymous Coward on Saturday September 10 2016, @12:32AM
Amazing! I have the same quantum lock on my quantum luggage.
(Score: 5, Informative) by Yog-Yogguth on Saturday September 10 2016, @01:06AM
When I first heard of this a few days ago or so I kind of reacted to the claim about the key being shorter than the message. Sure it's "shorter" in a sense but not really because the key still contains more (and possibly a lot more) information than the message thus Shannon is still right.
Isn't this just a case of someone (their PR department) not understanding the meaning of what Shannon originally said?
Bite harder Ouroboros, bite! tails.boum.org/ linux USB CD secure desktop IRC *crypt tor (not endorsements (XKeyScore))
(Score: 3, Interesting) by stormwyrm on Saturday September 10 2016, @06:00AM
I skimmed the original 2013 paper by Seth Lloyd which gives the theory that the subsequent papers put into practice. The way I understand it, is that Alice and Bob agree on a secret key of m bits, as well as 2m unitary operations that they can apply to quantum states. Alice maps her message into a quantum state and applies the unitary operation that corresponds to the secret key to it. Bob, who also knows the secret key, can use the inverse operation corresponding to the key to recover the original quantum state Alice chose corresponding to her message with and from there can determine the message. Eve, who doesn't know the secret key, cannot perform a classical brute force attack on the message. She can try to use one of the 2m inverse unitary operations in an attempt to decode the message the way Bob would but if she uses the wrong one, that will ruin the information in the message and she can potentially get less and less information. Even if she later chooses the right one afterwards the state that was sent was already altered by her previous attempts.
Anyone else with more time and more quantum mechanics chops feel free to correct me here.
Numquam ponenda est pluralitas sine necessitate.
(Score: 3, Funny) by Bot on Saturday September 10 2016, @07:47AM
- well, 00137, still using one time pads? use shorter keys!
- shorter keys? looks handy, what should I do?
- first, you get a spatial light modulator...
- wonderful. and how would a dang spatial light modulator not raise suspicion when I'm on a mission?
- Q is reshaping it into a vibrator.
- another vibrator? I thought that, after that incident with M's wife...
Account abandoned.