Computing a Secret, Unbreakable Key
May 23, 2016 | University of WaterlooEstimated reading time: 2 minutes

What once took months by some of the world’s leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo’s Institute for Quantum Computing, paving the way for fast, secure quantum communication.
Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).
QKD allows two parties, Alice and Bob, to establish a shared secret key by exchanging photons. Photons behave according to the laws of quantum mechanics, and the laws state that you cannot measure a quantum object without disturbing it. So if an eavesdropper, Eve, intercepts and measures the photons, she will cause a disturbance that is detectable by Alice and Bob. On the other hand, if there is no disturbance, Alice and Bob can guarantee the security of their shared key.
In practice, loss and noise in an implementation always leads to some disturbance, but a small amount of disturbance implies a small amount of information about the key is available to Eve. Characterizing this amount of information allows Alice and Bob to remove it from Eve at the cost of the length of the resulting final key. The main theoretical problem in QKD is how to calculate the allowed length of this final secret key for any given protocol and the experimentally observed disturbance.
A mathematical approach was still needed to perform this difficult calculation. The researchers opted to take a numerical approach, and for practical reasons they transformed the key rate calculation to the dual optimization problem.
“We wanted to develop a program that would be fast and user-friendly. It also needs to work for any protocol,” said Patrick Coles, an IQC postdoctoral fellow. “The dual optimization problem dramatically reduced the number of parameters and the computer does all the work.”
The paper, Numerical approach for unstructured quantum key distribution, published in Nature Communications today presented three findings. First, the researchers tested the software against previous results for known studied protocols. Their results were in perfect agreement. They then studied protocols that had never been studied before. Finally, they developed a framework to inform users how to enter the data using a new protocol into the software.
“The exploration of QKD protocols so far concentrated on protocols that allowed tricks to perform the security analysis. The work by our group now frees us to explore protocols that are adapted to the technological capabilities” noted Norbert Lütkenhaus, a professor with IQC and the Department of Physics and Astronomy at the University of Waterloo.
Testimonial
"In a year when every marketing dollar mattered, I chose to keep I-Connect007 in our 2025 plan. Their commitment to high-quality, insightful content aligns with Koh Young’s values and helps readers navigate a changing industry. "
Brent Fischthal - Koh YoungSuggested Items
Siemens, TRUMPF Partner to Accelerate Digital Manufacturing and AI Readiness
09/16/2025 | SiemensTechnology company Siemens and leading machine tools and laser manufacturer TRUMPF announced a partnership that promises to elevate industrial production by harnessing advanced digital manufacturing solutions.
Bittium Launches New Ultra Secure Bittium Tough Mobile 3 and Establishes a Strategic Collaboration with HMD Secure
09/10/2025 | CisionBittium Corporation announces the launch of its new generation high-security Bittium Tough Mobile 3 smartphone. At the heart of the device is Bittium’s secure software technology, which provides users with a comprehensive communication solution designed to meet the ever-growing requirements for mobile security and performance.
I-Connect007 Editor’s Choice: Five Must-Reads for the Week
09/05/2025 | Andy Shaughnessy, I-Connect007It’s almost fall here in Atlanta, and that means that the temperature is finally dropping. And it quit raining! It’s been raining since March, and I’m so over it, as the social influencers say. Last night we grilled out on the deck, and it wasn’t hot, and we didn’t get rained on. Life is good. It was a busy week in the industry. In this installment of my must-reads, we say goodbye to Walt Custer, the man who made PCB data points interesting for the rest of us.
What EMS Firms Want From Their Software—and What They Get
09/03/2025 | Thiago Guimaraes, Global Electronics AssociationLast November, the Global Electronics Association [as IPC] surveyed EMS and OEM companies to better understand the software tools driving their operations and uncover trends in adoption, satisfaction, and challenges. The survey assessed software tools across critical functions, including ERP, MES, PLM, QMS, LMS, quoting systems, and CRM. Participants shared insights on tool adoption, satisfaction, and selection priorities.
Peak Rock Capital Affiliate Completes Acquisition of Aegis Software
08/25/2025 | Aegis SoftwareAn affiliate of Peak Rock Capital, a leading middle-market private investment firm, announced that it has completed the acquisition of Aegis Industrial Software, a global provider of innovative manufacturing execution system (MES) software for electronic components and discrete manufacturing across the aerospace & defense, medical device, consumer electronics, and diversified industrial end-markets.