Skip to main content

Introduction to Quantum Cryptography

 

One of the great potential applications of quantum mechanics is quantum cryptography. According to physicists, quantum cryptography is a safer method for transmitting the desired information, as it uses the logic of quantum mechanics, unlike classical cryptography.

What matters in quantum cryptography is quantum keying. For this, basically, two quantum algorithms or protocols have been created.

The first of these is the BB84 protocol, which is still used today. This method was developed by Charles Bennett and Gilles Brassard in 1984.

This protocol takes advantage of the polarization states of photons. Let's start to explain the protocol through familiar names.

Let Alice want to send the requested information, for example, 11010011, to the recipient Bob. Let Eve, our third character, be the person who captures the quantum information Alice sent before it reaches Bob.

Alice will transmit 11010011 information, which is made up of photons, to Bob via fiber optic cables. | Let the and / filters be used to measure the 0 qubit, and the - and \ filters to measure the 1 qubit.

Let Bob measure the disposable quantum information that reaches Bob without being subjected to any espionage situation, using the filters in his hand, and the information he obtained is 11010110. As you can see, the information that Bob reaches is different from half of the information that Alice wants to send. The main reason for this is that Bob and Alice do not inform each other about their filters beforehand. Therefore, if Alice and Bob use the quantum switching filters they have previously agreed upon, the information will be delivered to the receiver correctly.

However, there is a risk here. Eve, which we define as a third character, may be able to hack information. However, Eve must be able to find the correct measuring filter. In this way, he can reach half-true or half-false information. If encryption is done by squaring the key decided by Alice and Bob, the security of the system increases even more. Thus, quantum cryptography is provided.

The second quantum cryptography method is the EPRBE protocol. This method is created by exploiting the quantum uncertainty and entanglement state. This protocol is somewhat complex in nature and therefore difficult to implement up to date.

Generally speaking, quantum cryptography is a subject that has been studied a lot by scientists. Because of the use of classical cryptology electronic circuit devices, they are more robust. However, creating a quantum state between photons and transmitting the generated photons without loss is a disadvantage. Because, due to any external factor such as temperature and interference, quantum states can be disrupted immediately. For all these reasons, quantum cryptographic optimizations are being made for military studies, although it seems difficult to adapt them to daily life for now.

Comments

Post a Comment

Popular posts from this blog

Let's Define Quantum Programming

    Along with the strange discoveries of quantum physics, one of these ideas for how we could use it is quantum computers. Work on quantum computers, which is a pretty good idea, started small and became what it is today. Now we had to take one more step and do quantum programming. The first studies on this process were made in the early 2000s. However, these studies were more theoretical. This was because quantum computers were not yet technologically ready. Finally, with the serious development of quantum computers (of course, we are still not at the desired point) we started to create our quantum algorithms. Today, we can do these algorithms on IBM Quantum Experience, Microsoft Azure Quantum, DWave Leap Cloud, or with quantum development kits. With these platforms, most of which are open source, we can create our quantum algorithms with the Python language, which we use classically and which is the most common programming language. The fact that such platforms are open source is al

Quantum Memories in Free Space

     In quantum technologies, the important point is to be able to transmit the information-carrying quantum bits (qubits) from the transmitter to the receiver without loss or damage. This is one of the main purposes. For this, physicists are developing quantum memories that allow us to store information-loaded photons for certain periods of time to be transmitted at any time. Quantum memories are essential components for applications such as quantum information processing, quantum networks, and quantum repeaters. There are quantum devices developed by various methods in order not to lose photons or disrupt their function during the storage process of qubits. In today's article, I will talk about an alternative approach besides the material quantum memories produced. Scientists from the University of Illinois Urbana-Champaign, Truman State University, and RightHand Robotics, Inc. have succeeded in producing a quantum memory in free space. Before describing quantum memories operatin

Quantum Phase Estimation - Calculating an Eigenvalue

    We continue our series of fundamental and ongoing quantum algorithms. In today's post, we'll look at the eigenvalue calculation that is familiar to anyone in both the basic sciences and engineering. We will consider a slightly different situation, of course, our work is quantum. Let's consider the quantum state of a system! When we make an observation, we obtain real observation values by calculating the eigenvalues and eigenvectors of the state in that system, the mathematical calculation that helps us to have information about the position, momentum, or energy of that system. So, how can we find the eigenvalues of the unitary operators, which act on a system without changing its size, that is, preserve its physical size? To solve this problem, we will examine the Quantum Phase Estimation solution. In order to find the eigenvalues of the unit operator U, we need to find the value of the phase ϕ, which is inside the exponential value. However, it is not that easy. A qua