Science Focus
original post »Principle behind the proposed quantum cryptography protocol. The final single bit value is calculated from many bits through a pair of numbers {i,j} announced by the receiver, Bob. The upper panel corresponds to the actual scheme, in which Bob measures the wave-like nature of the received light sent by Alice to learn the final bit value. Notice that the value of {i,j} might be controlled by an eavesdropper (Eve) through the signal (II) fed to Bob’s measurement process M, so looking at this panel alone, the security is ambiguous. If Bob now measures the particle-like nature of the received light, he no longer learns the final bit but can still exactly produce the same pair {i,j} Lower panel: Here it is seen that {i,j} is directly randomized by the random number generator. Therefore, the possibility that Bob could have measured the particle-like nature of the received light ensures that the randomness of {i,j} is not rigged by Eve. Credit: Toshihiko Sasaki Cryptography – the art and science of providing secure communications – typically employs three methods to authenticate users and prevent data theft: secret key (symmetric) cryptography, which uses a single key for both encryption and decryption; public key (asymmetric) cryptography which uses different
The post Eavesdroppers begone: New quantum key distribution technique is impervious to noise has been published on Technology Org.
#physics
» see original post http://feedproxy.google.com/~r/TechnologyOrgPhysicsNews/~3/2_aJ1WBbP_g/
See Zazzle gifts tagged with 'science'
No comments:
Post a Comment