- News Home
6 March 2014 1:04 pm ,
Vol. 343 ,
Two studies show that eating a diet low in protein and high in carbohydrates is linked to a longer, healthier life, and...
Considered an icon of conservation science, researchers at World Wildlife Fund (WWF) headquarters in Washington, D.C.,...
The new atlas, which shows the distribution of important trace metals and other substances, is the first product of...
Early in April, the first of a fleet of environmental monitoring satellites will lift off from Europe's spaceport in...
Since 2000, U.S. government health research agencies have spent almost $1 billion on an effort to churn out thousands...
Magdalena Koziol, a former postdoc at Yale University, was the victim of scientific sabotage. Now, she is suing the...
Antiretroviral drugs can protect people from becoming infected by HIV. But so-called pre-exposure prophylaxis, or PrEP...
- 6 March 2014 1:04 pm , Vol. 343 , #6175
- About Us
15 January 2003 (All day)
No World War II spy thriller is complete without the scene in which the sexy secret agent steals an enemy codebook holding the secret keys used to encrypt messages. In the last half-century, technology for transmitting secret keys has advanced, but even the most sophisticated devices can't always prevent the key from being stolen. That may soon change. A new study presents a way to harness the weird laws of quantum physics to build a key-transmission system potentially as unbreakable as the laws of physics.
The famous Heisenberg Uncertainty Principle asserts that it is impossible to measure certain physical parameters, such as the position of a particle, without changing other parameters, such as its momentum. This property could be exploited to transmit cryptographic keys securely. The idea is that if Alice wants to send Bob a secret numerical key, she can encode the key's digits into the physical parameters of particles, which she then sends to Bob. If Eve tries to surreptitiously measure the particles, her measurements will change the state of the particles, betraying her presence.
Building devices based on this idea has been difficult: Standard schemes require Alice to encode each bit of information in a single photon, but it's hard to build detectors that accurately measure the photons on Bob's end. Now, Philippe Grangier of the Institute of Optics in Orsay, France, and colleagues have devised a way to encode the key in laser pulses consisting of hundreds of photons. In the 15 January issue of Nature, they report transmitting keys through an optical line at rates of 75,000 bits each second, more than enough for many applications. The researchers also showed that any eavesdropping carried out with today's technology--such as using a beam splitter to siphon off part of the laser beam--would be noticeable.
But they haven't yet proven that the system is secure against any possible attack allowed by the laws of physics, cautions John Preskill, a physicist at the California Institute of Technology in Pasadena. The team is currently working on such a proof, Grangier says. For now, the important thing is that the team's experiment proves that building such a system is feasible, says Richard Hughes, who studies quantum cryptography at Los Alamos National Laboratory in New Mexico. "It's a breakthrough proof-of-principle experiment," he says.