Comprehensive coverage

Development at the Technion: a semi-quantum encryption protocol

In conventional quantum encryption, quantum encryption machines are needed on both sides. With the method developed at the Technion's Faculty of Computer Science, it is possible to be satisfied with one quantum side, while the other side is provided with coding capabilities of classical information only. Although the method is semi-classical, if someone eavesdrops, the eavesdropping produces a lot of noise, which is felt by the legitimate users

Dan Koenigsberg, Technion
Dan Koenigsberg, Technion

The researchers of the Faculty of Computer Science at the Technion have found an innovative quantum encryption method for transferring secrets that does not require sophisticated quantum equipment on both sides. The protocol they developed may have different consequences for secret communication between a "smart" and well-equipped center, and naive and simpler users (such as satellites, small military bases or local branches of the bank).

In the classic computer world, it is easy to transmit a secret in a completely safe way if Alice (the sender of the secret) and Bob (the receiver of the message) have a common "key" in advance, that is, some information ("bits" or letters) that is secret, completely random, and the length of which is the length of the secret.
The remaining problem, then, is how to transfer the same secret key from Alice to Bob. Since 1984, it has been accepted among researchers that the only way to transfer the same secret key in a completely safe way is to code the bits of the secret key in a quantum way, for example - into certain properties of photons.

In a conversation with the Hidan website, Prof. Moore explains that "the currently accepted key transfer method is the RSA method, which relies on a very long number - with hundreds of digits - and its initial components. The assumption is that multiplying prime numbers is an easy operation to perform, while trying to decompose a large number into its prime components is a difficult operation that requires a lot of computing power. Therefore, it will always be possible to find keys long enough, that the calculation power required to decipher them will be so great, to the point of making the decipherment impossible. However, there is no proof of safety for this method and methods similar to it, and it is possible that a large intelligence agency already knows the hack, but keeps this fact a secret. It is even possible (though much less likely) that a genius hacker will succeed in developing RSA in the coming years. It is especially interesting to note that theoretically, the RSA method has already been broken, but not by a normal algorithm but on quantum computers. But in practice, cracking this is still very far away - it will happen if and when quantum computers are buildable. They will be able to decipher any RSA cipher and the like, of any length. In light of the above dangers, it is important to know that there is also a completely different method, based on quantum theory."

Prof. Moore adds: "The fundamental principle in quantum theory is that studying one property of a particle (for example, its position) necessarily affects another property (for example, its speed). In 1984, researchers Charles Bennett and Gilles Bresser showed that precisely using this fundamental principle makes it possible to transmit secrets in an innovative and completely safe way with the help of quantum information encoded in the properties of photons. Because of this law of quantum theory, an adversary trying to learn the secret will inevitably introduce noises that legitimate users will notice.”

Despite the common name, quantum computers are not closely related to quantum cryptography. While quantum computers are in the experimental stage of their life, there are quantum encryption machines on the market, and they are not even that expensive (about 80 thousand dollars per unit). The problem is that to transmit and decode encrypted messages requires sophisticated quantum capabilities on both sides of the line. Our discovery, which was a central part of Dr. Dan Koenigsberg's doctoral thesis, means that it is probably possible to reach the exact same level of safety, even if one of the users does not use the principles of quantum theory and does not even know that the protocol he is using is semi-quantum."

In the conventional model of quantum key transfer, Alice creates a string of zeros and ones and encodes each "bit" using a photon polarized in one of the following two ways: a "computational" basis, also called a "classical" basis, where ones and zeros are represented through vertical vs. horizontal polarization, or a "diagonal" basis ”, where one and zero are represented by polarities plus 45 degrees and minus 45 degrees, respectively. If we imagine a photon trying to pass through sunglasses, then a horizontally polarized photon will pass through and reach the observer's eye, while a vertically polarized photon will be absorbed by the glass or reflected back. As in the case of position versus velocity, here too the polarization cannot be learned correctly if a different basis is used than the one in which the photon is coded.

When a photon from Alice reaches Bob, he chooses one of the bases - "computational" or "diagonal" and tells Alice which basis he is using. Every time he uses the wrong base, he gets a random answer, and Alice tells him to get rid of that "bit", meaning to ignore the photon. These "bits" are removed, and the secret key is produced from the remaining ones. If there is any eavesdropper, when he receives the photons he has to guess which base to use to read them. As a result, and in accordance with the laws of quantum mechanics, he actually damages the polarization every time he guesses correctly, introduces noise, and robs Bob of his ability to correctly read some of the photons he might have read correctly. The noise that Bob notices reveals to Bob that the communication channel is jammed by an eavesdropper."

We will now look at another example, which better demonstrates why a certain base should be called "classic". Let a given particle be inside a thousand box or inside a house box. Alice sends Bob the two boxes with only a single particle in them. According to quantum theory, the single particle can also be in both boxes (a feature that has no analogy in our ordinary, "classical" world). The question "In which box is the particle?" is a question that the classic user can ask. Coding the secret in the "computational" base (that is, in the "classical" base) in this case means that "zero" is coded by placing the particle in the thousand box, and "one" is coded by placing the particle in the one box. Coding the secret in the "diagonal" base, its meaning is now more complex: we will define a "phase" between the two states (a thousand box and a house box) and then the particle can be in both boxes and with a "+" phase when coded "zero", or in both boxes and with a "-" phase When "one" is coded. The question "Is the particle found with a "+" phase or with a "-" phase can only be asked by a user with quantum capabilities.

In the picture: the microphotonics laboratory in the Faculty of Electrical Engineering at the Technion and the team conducting research in the implementation of quantum encryption. On the right (sitting) Prof. Tal Mor from the Faculty of Computer Science. Standing (from the left) Dr. Mati Katz and next to him Prof. Meir Orenstein from the Faculty of Electrical Engineering. Pavel Gurvitz, Alex Hait and Alex Porotsky are part of the team that will try to implement the new method.
In the picture: the microphotonics laboratory in the Faculty of Electrical Engineering at the Technion and the team conducting research in the implementation of quantum encryption. On the right (sitting) Prof. Tal Mor from the Faculty of Computer Science. Standing (from the left) Dr. Mati Katz and next to him Prof. Meir Orenstein from the Faculty of Electrical Engineering. Pavel Gurvitz, Alex Hait and Alex Porotsky are part of the team that will try to implement the new method.

For more than two decades, all researchers in the field were absolutely convinced that a secret quantum protocol required both Alice and Bob to have quantum capabilities. Technion researchers have now discovered, in collaboration with researcher Michel Boyer from the University of Montreal in Canada, that it is probably possible to obtain exactly the same level of safety in a system that is semi-quantum, that is, only Alice needs to be quantum. Bob only uses the "classic" basis - that is, the "calculation" basis, not the "diagonal" basis. In the new protocol, Bob returns photons back to Alice, with some of them untouched at all, and Alice is the one who measures the base corresponding to the base in which she sent each photon. This system is safe, because the eavesdropper does not know in advance which photons will be returned to Alice without being measured by Bob, and thus the eavesdropper is prevented from interfering with the communication, because any interference by him will inevitably introduce a lot of noise into the information and will be felt by Alice and Bob.

Let's think about the example in which Alice sends Bob two boxes containing a single particle. The particle is in one of four states: in a thousand box or a house box or both with a "+" phase or both with a "-" phase. Bob with quantum abilities can choose a measurement that will tell him which box the particle is in. Alternatively, he can choose a measurement that will ask what the phase is ("+" or "-"). But according to the laws of quantum theory, Bob cannot ask both questions. Now it is clear what Bob can do which is classic: he can measure in which box the particle, he can leave it in the box where he found it, and send both boxes back to Alice, and he can also return both boxes without measuring at all.

In the new protocol we showed that indeed these capabilities are sufficient to define a semi-quantum protocol, yet secure against eavesdropping.

17 תגובות

  1. Michael: You say (quote) "Another reason to introduce the idea of ​​a quantum computer is the mind's wonderful ability to deal with problems that the computers we build with the usual technologies - whether von Neumann computers or neural networks (such as can be simulated in von Neumann computers) cannot begin to deal with you"
    Can you elaborate? What problems can the brain solve under the following two conditions:
    A. The brain is much faster than a normal computer
    B. It seems that quantum computation (superposition, entanglement, constructive interference for the desired solution) could improve (ie the problem is probably not in P or BPP complications)
    At Penrose I once saw such an unconvincing example that it took away my motivation to read beyond it.

    Another question related to this - in the process of evolution, from which stage can it be said that the brain of the animal solves the difficult problem? Does a group of neurons in a worm brain already do this? Does it require CNS meaning central nervous system? Does it require something more, beyond the CNS of an insect or a fish or a cat?

  2. The reason why Penrose made the hypothesis is what we see as "free will". He claimed that the randomness inherent in quantum theory can provide the non-deterministic element that we feel in our souls in a world that without quantum theory is completely deterministic - even if chaotic.
    Another reason to introduce the idea of ​​a quantum computer is the brain's amazing ability to deal with problems that the computers we build with the usual technologies - whether von Neumann computers or neural networks (such as those that can be simulated in von Neumann computers) do not begin to deal with even though their electronics are much faster and computational problems Simplicity they solve much faster. The idea of ​​the superpositions that allow many calculations to be carried out at the same time winks as an idea that can not only speed up the calculation on ordinary computers but also explain the power and flexibility of the brain.
    I, although I have already worked on normal computers and have also built expert systems and neural networks, I really do not know how the brain works and whether it can be realized even without the use of quantum phenomena.
    I must say that my feeling is that there are no such phenomena in the brain, but it is a feeling that, as I explained, is not based at all.
    You have to remember that once upon a time - before computers were invented, they used to simulate the brain as the most sophisticated thing they knew at the time and the models were of one type of engine or another. It is therefore quite understandable, psychologically, why people today tend to think of a quantum computer in this context.
    To summarize my opinion on the subject, the data today do not allow to decide one way or the other.
    There is no weight to Ockham's razor here either, because one way or another - quantum phenomena occur everywhere, including in the brain.

  3. Obviously, in this context the word "encrypted" should be replaced by the word "encoded" (quantum) to avoid misunderstandings. So I will repeat the question: why think so? Is there any reason to think (or believe) that the information in the brain is quantum coded? Does anything in our current understanding hint at any need to introduce quantumness into the matter? Nevertheless, we know quite a bit about the brain, so we can look for a reason...

  4. As I said, Penrose did not say that the information is quantum encrypted. He speculated that the processing is quantum.
    This is a legitimate speculation that I did not claim to be acceptable to me.
    In the current situation where we have not yet cracked the keys (not encryption) the brain still needs to be open.

  5. To Michael and to the point: indeed Penrose wrote a number of books and probably sold quite a few copies, but I don't remember him really giving a good and convincing answer to the question I asked (and many ask): why think so? That is, is there any reason to think (or believe) that the information in the brain is quantum encrypted.

  6. Anyone who wants to read an interesting opinion on the connection between the mind and quantum theory is encouraged to read Penrose's book The Emperor's New Mind
    Of course he is not talking about quantum encryption but about a quantum process of information processing, a process that is more reminiscent of a quantum computer.

  7. For 8 indeed your answer to 6 is more accurate than mine!
    9 has an interesting question, of course, that everyone asks, but why think so? there is a reason?
    By the way, for those who want to see exactly what Michelle Boyer, Dan Koenigsberg and Tal Mor wrote, the article can be found at
    Physical Review Letters, vol. 99,
    Issue 14, id. 140501 and a version (perhaps not quite the same) can be seen at
    arXiv:quant-ph/0703107

  8. To 6 and to the answer given in 7:
    Your question, straw man, is not about a war in cipher but about a war in transmission.
    So is Tal's answer regarding the disruption.
    Cipher warfare is a process that allows an unintended listener to decipher its content. Disruption does not allow this to be done.

  9. For 3, learning the position hurts the momentum and vice versa - learning the momentum hurts the position.

    For 6 either disrupt, or look for a bug in the implementation (safety of an "ideal" protocol and safety of the implementation of the protocol are not necessarily the same). A perfect implementation is often technically impossible, and a simplistic implementation may contain bugs. This is true both for the usual quantum encryption, and for RSA and the like. Sometimes these attacks are called side-channel attacks

  10. You lost me in the eighth paragraph and I am still strengthened by a number of knowledge about cryptography. But still a mob.

    So how do you fight such a cipher? Just disrupting it?

  11. For 2: indeed when it comes to polarization, there is no special meaning to the vertically balanced base compared to the diagonal one. What is important then, is that the basis is single, in contrast to the usual quantum encryption where there are two bases (and the uncertainty relevant to that). So Bob is classical in a less important sense, and there may be a theoretical interest in this, but it is not clear if there is a practical advantage in this. On the other hand, in the box pattern (the photon is in the thousand or house position) it is clear that a certain basis deserves to be called classical. Most of the implementations to date are more similar to the box model (including the ready-made system that can already be bought from the two aforementioned companies), although it is important to note that they use two bases, both of which are not the case of a particle in the thousand or in the house, but rather four different phase options.

  12. Uncertainty principle states that the knowledge of the position harms the speed or harms the knowledge of the speed?

  13. Kudos to the researchers!
    Why does it matter so much if you use diagonals or verticals? I didn't understand what the difference was..

  14. Interesting and nice to see and read about theoretical science that becomes practical.
    Until the implementation of the method, all I have left is to ask:
    How much does it cost to send a package with one particle by FedEx?
    And what's more: does the fact that I know the location of the package affect its speed?

    I can already give the answer to the second question: yes!

Leave a Reply

Email will not be published. Required fields are marked *

This site uses Akismat to prevent spam messages. Click here to learn how your response data is processed.