Computing a Secret, Unbreakable Key
May 23, 2016 | University of WaterlooEstimated reading time: 2 minutes

What once took months by some of the world’s leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo’s Institute for Quantum Computing, paving the way for fast, secure quantum communication.
Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).
QKD allows two parties, Alice and Bob, to establish a shared secret key by exchanging photons. Photons behave according to the laws of quantum mechanics, and the laws state that you cannot measure a quantum object without disturbing it. So if an eavesdropper, Eve, intercepts and measures the photons, she will cause a disturbance that is detectable by Alice and Bob. On the other hand, if there is no disturbance, Alice and Bob can guarantee the security of their shared key.
In practice, loss and noise in an implementation always leads to some disturbance, but a small amount of disturbance implies a small amount of information about the key is available to Eve. Characterizing this amount of information allows Alice and Bob to remove it from Eve at the cost of the length of the resulting final key. The main theoretical problem in QKD is how to calculate the allowed length of this final secret key for any given protocol and the experimentally observed disturbance.
A mathematical approach was still needed to perform this difficult calculation. The researchers opted to take a numerical approach, and for practical reasons they transformed the key rate calculation to the dual optimization problem.
“We wanted to develop a program that would be fast and user-friendly. It also needs to work for any protocol,” said Patrick Coles, an IQC postdoctoral fellow. “The dual optimization problem dramatically reduced the number of parameters and the computer does all the work.”
The paper, Numerical approach for unstructured quantum key distribution, published in Nature Communications today presented three findings. First, the researchers tested the software against previous results for known studied protocols. Their results were in perfect agreement. They then studied protocols that had never been studied before. Finally, they developed a framework to inform users how to enter the data using a new protocol into the software.
“The exploration of QKD protocols so far concentrated on protocols that allowed tricks to perform the security analysis. The work by our group now frees us to explore protocols that are adapted to the technological capabilities” noted Norbert Lütkenhaus, a professor with IQC and the Department of Physics and Astronomy at the University of Waterloo.
Suggested Items
Elementary, Mr. Watson: Rein in Your Design Constraints
07/10/2025 | John Watson -- Column: Elementary, Mr. WatsonI remember the long hours spent at the light table, carefully laying down black tape to shape each trace, cutting and aligning pads with surgical precision on sheets of Mylar. I often went home with nicks on my fingers from the X-Acto knives and bits of tape all over me. It was as much an art form as it was an engineering task—tactile and methodical, requiring the patience of a sculptor. A lot has changed in PCB design over the years.
Stop Using Spreadsheets—and You Can Quote Me on That
07/03/2025 | Nolan Johnson, SMT007 MagazineMeeting changing business needs and a thriving market sometimes means process efficiencies. Not all those efficiency improvements take place on the shop floor, however. For EMS companies, growth can also mean changing out the business operations software to have one more chance to close a business deal that better aligns with the company’s sweet spot. One of the pressing issues for EMS companies is the great deal of attention on sales and quoting software solutions and how to make them perform better. Chintan Sutaria, the founder and former CEO of CalcuQuote now working on other projects at OpenJar, explains.
IPC-CFX, 2.0: How to Use the QPL Effectively
07/02/2025 | Chris Jorgensen, Global Electronics AssociationIn part one of this series, we discussed the new features in CFX Version 2.0 and their implications for improved inter-machine communication. But what about bringing this new functionality to the shop floor? The IPC-CFX-2591 QPL is a powerful technical resource for manufacturers seeking CFX-enabled equipment. The Qualified Product List (QPL) helps streamline equipment selection by listing models verified for CFX compliance through a robust third-party virtual qualification process.
NXP Completes Acquisition of TTTech Auto to Accelerate the Transformation to Software-Defined Vehicles
06/21/2025 | NXP SemiconductorNXP Semiconductors N.V. announced the completion of the acquisition of TTTech Auto , a leader in innovating unique safety-critical systems and middleware for software-defined vehicles (SDVs), pursuant to the terms of the previously announced agreement from January 2025.
Adeon Technologies Signs Agreement as Distribution and Service Partner for PMT Global
06/13/2025 | Adeon Technologies BVAdeon Technologies has signed an agreement as Distribution and Service partner with PMT Global from Germany for its high precision measurement range of products.