Quantum cryptography gets closer to reality
A joint research project between Fujitsu and The University of Tokyo has made progress towards realising a viable quantum cryptography system. Such a system allows parties to share encryption keys via telecommunication networks confident that they have not been compromised en route.
The team has succeeded in generating and detecting a single photon at wavelengths useful for telecommunications, said Yasuhiko Arakawa, director of the Nanoelectronics Collaborative Research Centre at The University of Tokyo and leader of the research project.
The reliable generation and detection of single photons is vital if quantum cryptography systems are to leave the laboratory and enter practical use and the team has managed this through the development of a new photon generator.
Quantum cryptography is based on the physical properties of photons.
If two parties want to exchange encrypted data they need to share the electronic key that will be used to encode the data. The data is encoded with a corresponding private key, so using the genuine public key is vital. Should a fake key be substituted for the real one the data could be read by a third party rather than the intended recipient. Sharing of keys across telecommunication networks can expose the key to tampering so many users exchange keys offline via physical media, such as a floppy disc or CD-Rom.
Under public key infrastructure (PKI) schemes, public keys are certified as being genuine by a certificate authority.
Quantum cryptography systems allow users to exchange keys across networks with the knowledge that they have not been tampered with during transmission.
This is because each data bit of the key is encoded onto individual photons of light. A photon cannot be split so it can only end up in one place: with the intended receiver or with an eavesdropper. Should a key be completely received the recipient can be sure it has not been compromised and should it be incorrectly received there is a chance that it has been intercepted and so a new key can be issued.
more from [url=http://www.computerweekly.com/articles/article.asp?liArticleID=132189&liFlavourID=1&sp=1]Computer weelky[/url]
July 28th, 2004 at 9:07 pm
?recall a swiss corp already has patents ?misplaced the linx; /methinx ?half yr ago