Computing a Secret, Unbreakable Key
May 23, 2016 | University of WaterlooEstimated reading time: 2 minutes
What once took months by some of the world’s leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo’s Institute for Quantum Computing, paving the way for fast, secure quantum communication.
Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).
QKD allows two parties, Alice and Bob, to establish a shared secret key by exchanging photons. Photons behave according to the laws of quantum mechanics, and the laws state that you cannot measure a quantum object without disturbing it. So if an eavesdropper, Eve, intercepts and measures the photons, she will cause a disturbance that is detectable by Alice and Bob. On the other hand, if there is no disturbance, Alice and Bob can guarantee the security of their shared key.
In practice, loss and noise in an implementation always leads to some disturbance, but a small amount of disturbance implies a small amount of information about the key is available to Eve. Characterizing this amount of information allows Alice and Bob to remove it from Eve at the cost of the length of the resulting final key. The main theoretical problem in QKD is how to calculate the allowed length of this final secret key for any given protocol and the experimentally observed disturbance.
A mathematical approach was still needed to perform this difficult calculation. The researchers opted to take a numerical approach, and for practical reasons they transformed the key rate calculation to the dual optimization problem.
“We wanted to develop a program that would be fast and user-friendly. It also needs to work for any protocol,” said Patrick Coles, an IQC postdoctoral fellow. “The dual optimization problem dramatically reduced the number of parameters and the computer does all the work.”
The paper, Numerical approach for unstructured quantum key distribution, published in Nature Communications today presented three findings. First, the researchers tested the software against previous results for known studied protocols. Their results were in perfect agreement. They then studied protocols that had never been studied before. Finally, they developed a framework to inform users how to enter the data using a new protocol into the software.
“The exploration of QKD protocols so far concentrated on protocols that allowed tricks to perform the security analysis. The work by our group now frees us to explore protocols that are adapted to the technological capabilities” noted Norbert Lütkenhaus, a professor with IQC and the Department of Physics and Astronomy at the University of Waterloo.
Suggested Items
U.S. Air Force Secretary Kendall Flies in AI-Piloted X-62A VISTA
05/06/2024 | Lockheed MartinLockheed Martin Skunk Works joined the U.S. Air Force Test Pilot School and other government and industry partners in hosting U.S. Secretary of the Air Force Frank Kendall to fly in the X-62A Variable In-flight Simulation Test Aircraft (VISTA), a one-of-a-kind aircraft modified to test artificial intelligence (AI) and autonomy capabilities.
Real Time with… IPC APEX EXPO 2024: Software Solutions for Circuit Board Challenges
05/03/2024 | Real Time with...IPC APEX EXPONolan Johnson speaks with Will Webb from Aster Technologies about their software solutions for design teams, manufacturing, test engineers, and process engineers. Aster's software addresses the increasing complexities of circuit boards and the need for alternative testing methods.
Real Time with… IPC APEX EXPO 2024: My Role as a Technology Solutions Director
05/02/2024 | Real Time with...IPC APEX EXPOPeter Tranitz, senior director of technology solutions at IPC, shares insights into his role as the design initiative lead. He details his advocacy work, industry support, and the responsibilities of the design initiative committee. The conversation also covers the revamping of standards, the IPC Design Competition, and the implementation of design rules in software tools.
Boeing Validates Software for Future Manned Unmanned Refueling Missions
05/02/2024 | BoeingBoeing has advanced its manned-unmanned teaming (MUM-T) technology using a digital F/A-18 Super Hornet and MQ-25 Stingray. The testing shows the software is maturing for future U.S. Navy use and a potential to deploy the teaming capability on both F/A-18 Block II and III Super Hornets.
Europlacer Presents New Range of iineo SMT Placement Machines.
05/01/2024 | EuroplacerFor more than 15 years, the Europlacer iineo placement machines have made their mark on the SMT industry with unique features and unrivalled flexibility. Today, Europlacer announces the launch of the second generation iineo.