# Science: Quantum communication thwarts eavesdroppers

RESEARCHERS at IBM’s Thomas J. Watson Laboratory in Yorktown Heights,

New York, have built a device for sending information between two parties

with absolute security from eavesdropping. The device uses a form of coding

called ‘Quantum Public Key Distribution (QPKD), which exploits quantum effects.

It cannot be implemented on any existing computer because of the intrinsic

limitations of classical (that is, non-quantum) information processing.

The device, built by Charles Bennett and John Smolin at IBM, uses very

faint flashes of light to transmit messages over an unprotected communication

channel. It allows the sender and receiver to agree on a code without ever

meeting in person. If an eavesdropper tries to monitor the signal in transit,

the uncertainty principle, an inescapable property of the quantum world,

ensures that the signal is disturbed in such a way that the sender and receiver

are alerted.

In building the device, which uses the polarisation of photons to encode

information, Bennett and Smolin have created the first information processing

device with capabilities that exceed those of the Universal Turing Machine.

This is a theoretical model proposed by the English mathematician Alan Turing

in 1936. All existing computers are, in effect, based on the Turing Machine.

Although both quantum theory and the modern theory of computation are

more than 50 years old, it is only recently that scientists have studied

in detail the implications of one for the other. Quantum computers should

be faster at some tasks and also able to tackle tasks that classical computers

cannot.

##### Advertisement

Building general-purpose quantum computers, however, is far beyond the

reach of present technology. The main problem is maintaining ‘quantum coherence’

during the intricate self-interactions of a typical computation. Loosely,

a coherent quantum system is one that is ‘isolated’ from the outside world.

Coherence is destroyed by any interaction in which the environment, or any

variable not participating in the computation, effectively ‘measures’ or

acquires any information about the system.

At present, physicists are able to maintain coherence only in very simple

systems, such as photons or electrons travelling from a diffraction grating

to a detector. Bennett and Smolin have nevertheless managed to use such

a system to carry out a new type of computation.

Suppose that Alice and Bob want to exchange messages in such a way that

an eavesdropper, Eve, who might be listening, cannot understand what they

are saying. If Alice and Bob already have some secret information in common,

they can use thisas a ‘key’ in a so-called ‘cryptographicalgorithm’. This

will scramble theirmessages so that Eve, who may knowthe algorithm but does

not know the key, cannot decipher it in a reasonable time.

The larger the amount of shared secret information that Alice and Bob

start with, the harder they can make Eve’s task. In fact, if the messages

they send are shorter in total than their secret key, they can make eavesdropping

impossible. But if they have no shared secret information to begin with,

they will not be able to agree on a key without letting Eve know it, too.

Can they still communicate securely? This is where ‘public key’ cryptography

comes in.

Classical public key cryptography was first proposed in 1976 by Diffle

and Hellman, and shortly afterwards Rivest, Shamir and Adelman published

the first practical version. Each participant secretly choosesa private

key, which is never transmitted to anyone else, and calculates from it a

public key.

Using Bob’s public key, Alice, or anyone else, can transmit messages

which only Bob can easily decipher in normal circumstances. Obviously, the

private and public keys are related mathematically, and in principle the

‘private’ key could be deduced from the public one. The trick is to make

computing the public key from the private key relatively simple, but the

reverse computation prohibitively time-consuming.

No classical public-key cryptographic system has yet been proved to

be secure. There is the danger that some ingenious mathematician will come

up with a quick way of calculating the function in both directions. Another

problem is the increasing speed of computers. A computation that would occupy

a present-day computer for a million years might be done in an hour on a

home computer in 20 years’ time.

Using classical information technology, it is impossible to design a

public-key cryptographic system that is not vulnerable to advances in pure

mathematics or computer technology.

Eve can simply copy all the messages that Alice and Bob send each other.

Then, if Alice and Bob had no secret information in common, Eve can find

out just as well as Bob can exactly what operation Alice uses to scramble

her messages. To unscramble them, one need only undo all these operations.

Bob may have a secret quick way of doing this, but that is the only advantage

he can possibly have over Eve. Given enough time, Eve will be able to read

whatever Bob can in Alice’s messages.

Bennett’s idea, invented with Gilles Brassard of the University of Montreal,

is to use the quantum uncertainty principle to prevent any eavesdropper

from reading a message without being detected. The uncertainty principle

says that if certain physical variables are prepared or measured precisely,

then certain other variables become multi-valuedor ‘fuzzy’. In particular,

the values that those other variables used to have can become inaccessible

to any measurement, however careful.

This applies to the linear polarisation of a photon (whether its polarisation

is horizontal or vertical, say) and its circular polarisation (whether it

is spinning in a right- or left-handed sense about its direction of travel).

It is not difficult to prepare photons in states of pure linear or circular

polarisation, but never both simultaneously. It is also possible to measure

precisely either the linear or the circular polarisation. But any measurement

of the linear polarisation makes the former value of the circular polarisation,

whatever it may have been, inaccessible; measuring it will give a random

result. Similarly, measuring the circular polarisation randomises any subsequent

measurement of the linear.

If Alice sends a stream of photons to KK Bob, she could use their individual

linear polarisations to transmit a message in binary code, using ‘horizontal’

to mean ‘zero’ and ‘vertical’ to mean ‘one’. Bob could measure the linear

polarisation (by passing the photons through a vertical polaroid filter

and using a photomultiplier to detect which have passed through) and thus

read the message. But this method of communication is insecure. There is

nothingto prevent Eve from measuring the polarisations herself and transmitting

appropriately polarised photons on to Bob so that the eavesdropping will

remain undetected.

Similarly, the circular polarisations of the photons could be used to

send insecure messages, by using ‘left-handed’ to mean ‘zero’ and ‘right-handed’

to mean ‘one’. But now suppose that Alice sends a message using these conventions

but choosing randomly whether to use the linear or the circular polarisation

code. Eve cannot intercept such a message and pass it on unchanged. Because

of the quantum uncertainty principle she cannot measure both the linear

and the circular polarisation. And if, for a particular photon, she chooses

wrongly and measures the polarisation variable that was not used to encode

the message, the bit that was stored in that photon will be irretrievably

randomised. This is the effect that makes the QPKD system work.

When Bob receives each photon, he chooses randomly which of its polarisation

variable to measure. In this way, he randomises about half the bits. But

the other half, provided that they were not measured or tampered with en

route, will have the values that they had when transmitted by Alice. When

Bob has received a large number of bits, he publicly exchanges information

with Alice about some proportion of them. Bob says which variable he measured

and Alice tells him, in about half the cases, what result he should have

got.

Then they do a statistical test to find out whether there was any eavesdropping.

If there was none they compare notes, again, publicly, about the remaining

photons. The photons for which they happened to choose the same variable

contain secret information that cannot be known by any eavesdropper.

The prototype QPKD machine is capable of transmitting its secret keys

over a distance of some 50 centimetres. Plans are in hand for an improved

model using optical fibres that would have a range of tens or perhaps hundreds

of metres. Relay stations cannot be used because they would have to measure

the photons, lose quantum coherence, and so be vulnerable to eavesdropping.

So it may be some time before quantum cryptographic technology becomes widely

useful in real applications.

The lasting significance of QPKD will be for the foundations of computer

science. The Turing Machine is no longer a universal model for practical

computations.