Editorial Feature

Newest Quantum Cryptography Protocol: 8 Is The Magic Number

Creating a pair of entangled photons in a crystal with eight possible paths could lead to a much more secure and robust form of quantum cryptology.

quantum cryptography, photons, quantum mechanics

Image Credit: Yurchanka Siarhei/Shutterstock.com

A new type of quantum cryptology that relies on photons that can travel in eight different paths could make a more secure and faster form of quantum cryptography that can transmit a wealth of information.

Quantum cryptography is already one of the most important practical applications of quantum mechanics, first developed at the beginning of the 20th century. 

The key principle behind quantum cryptology is entanglement, which Albert Einstein famously described as “spooky action at a distance.” When entangled particles are created, their qualities are intrinsically linked in such a way that if one is changed via an interaction, the other is instantly changed in a corresponding way.

The “spooky” element of this is that this instantaneous transformation happens no matter how far apart the particles are. So if the spin — an intrinsic magnetic property of a particle — of an electron is measured as ‘up’ the spin of its entangled partner instantly becomes ‘down’, even if those particles are at opposite sides of the Universe.

This is what troubled Einstein; his theory of special relativity hinges on the principle that nothing can travel faster than light, yet this information seems to be transmitted faster than this universal speed limit.

The great physicist believed that this indicated that quantum mechanics was an incomplete theory and that there must be ‘hidden variables’ in quantum systems, which we were yet to uncover.

Yet, in the century since its inception, this non-local aspect of quantum mechanics has been experimentally verified over and over again. This non-local “action at a distance” may be spooky, but it is real.

So, how can this idea be used to safely transmit information?

Quantum Cryptology: How Does It Work?

The idea of quantum cryptology hinges on creating a series of polarized pairs and photons to transmit data through fibre optic cable. The information is sent to two endpoints, each monitored by different people.

The photons are sent through a polarizer, that gives them opposite polarizations. They then travel to a series of beam splitters that ‘read’ each photons' polarization.

The monitors tells their counterpart what beam splitter was used for what photon, and this gives them a cryptographic key to decipher the information sent. 

The reason this is so secure and is used to safely transmit information by banks and a wide range of industries, is if the photons are intercepted and “read” by an eavesdropper the photon’s state is changed. 

This means that the monitors can tell if the information was intercepted, and there is no way for Eve to do this without being detected. In some quantum systems, the very act of intercepting the information could effectively destroy it.

The idea of the Atomic Institute of TU Wien professor, Marcus Huber, detailed in a paper published in Physical Review Letters, was to improve quantum cryptology by using a system in which photons can take more than two states, making the information even more difficult, maybe even impossible, for eavesdroppers to intercept.

Improving Quantum Cryptology

The research conducted by Huber and his team involved generating photon pairs with a laser in a special type of crystal. This can be done at one of eight points. 

Depending on the point where this pair was created, each of the photons can move down one of eight paths. In fact, the photons could move down several paths simultaneously, something that would not be allowed in classical physics, but is allowed in quantum mechanics.

quantum cryptography, photons, quantum mechanics

Conceptual Illustration of Quantum Entanglement. Image Credit: local_doctor/Shutterstock.com

This means that speaking in a strictly mathematical sense, the particle now exists in eight dimensions. When one of the photons is measured, its position is resolved and it is found on one of these eight paths. That means the person at point A knows what the person is measuring at point B. 

Alice and Bob should always obtain the same result.

Entangled photons created this way can carry much more information than standard entangled photons which have only two potential states. Not only that, but this system is more robust, as entangled systems are easily destroyed by decoherence.

This is caused by interactions with other systems, often something as simple as a magnetic field or other particles. Thus, systems lose their quantum properties, including entanglement, easily.

However, the quantum properties of a system that exists in more dimensions are far less easy to destroy. This means Huber and his team’s system could stay entangled even in the presence of disturbances. 

These disturbances can be further protected against decoherence by introducing sophisticated quantum error-correction mechanisms. These can be used to compensate for the influence of external perturbations.

There’s another benefit to this too: added security. There is no way of eavesdroppers obtaining the information passing between the two people monitoring the network without destroying the correlated polarization and making it abundantly clear interference has occurred.

As if the system wasn’t already impressive enough, Huber and his team suggest it could be further improved by adding more potential paths for the photons to travel down. More paths mean more dimensions, which means more protection against decoherence.

The only current issue the team found with this is that more paths make the end quantum state more difficult to read. This means when it comes to quantum cryptology, eight could be the magic number.

References and Further Reading

Hu. X-H., Zhang. C., Guo. Y., et al, [2021], ‘Pathways for Entanglement-Based Quantum Communication in the Face of High Noise,’ Physical Review Letters. https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.127.110505

Disclaimer: The views expressed here are those of the author expressed in their private capacity and do not necessarily represent the views of AZoM.com Limited T/A AZoNetwork the owner and operator of this website. This disclaimer forms part of the Terms and conditions of use of this website.

Robert Lea

Written by

Robert Lea

Robert is a Freelance Science Journalist with a STEM BSc. He specializes in Physics, Space, Astronomy, Astrophysics, Quantum Physics, and SciComm. Robert is an ABSW member, and aWCSJ 2019 and IOP Fellow.

Citations

Please use one of the following formats to cite this article in your essay, paper or report:

  • APA

    Lea, Robert. (2021, October 19). Newest Quantum Cryptography Protocol: 8 Is The Magic Number. AZoQuantum. Retrieved on April 24, 2024 from https://www.azoquantum.com/Article.aspx?ArticleID=229.

  • MLA

    Lea, Robert. "Newest Quantum Cryptography Protocol: 8 Is The Magic Number". AZoQuantum. 24 April 2024. <https://www.azoquantum.com/Article.aspx?ArticleID=229>.

  • Chicago

    Lea, Robert. "Newest Quantum Cryptography Protocol: 8 Is The Magic Number". AZoQuantum. https://www.azoquantum.com/Article.aspx?ArticleID=229. (accessed April 24, 2024).

  • Harvard

    Lea, Robert. 2021. Newest Quantum Cryptography Protocol: 8 Is The Magic Number. AZoQuantum, viewed 24 April 2024, https://www.azoquantum.com/Article.aspx?ArticleID=229.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this article?

Leave your feedback
Your comment type
Submit

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.