A multi-photon approach to quantum cryptography
October 5, 2012
As increasing volumes of data become accessible, transferable and, therefore actionable, information is the treasure companies want to amass.
To protect this wealth, organizations use cryptography, or coded messages, to secure information from “technology robbers.” This group of hackers and malware creators increasingly is becoming more sophisticated at breaking encrypted information, leaving everyone and everything, including national security and global commerce, at risk.
“Unfortunately, all commercial cryptography techniques used today are based on what is known as computational security,” Professor Subhash Kak from Oklahoma State University said. “This means that as computing power increases, they are increasingly susceptible to brute force and other attacks based on mathematical principles that can recover information without knowing the key to decode the information.” Cryptography techniques based on quantum mechanics are not susceptible to such attacks under any imaginable condition.
In 2006, Kak postulated a theory known as the three-stage protocol, which relies on the unpredictability of photons to ensure hackers can’t locate or replicate the information used to transmit information. The first laboratory demonstration of Kak’s concept took place at the College of Engineering labs at the OU-Tulsa Schusterman Center.
Verma says this is an important step toward the widespread adoption of Kak’s discovery and may lead to a future in which “no matter how long or how hard they try, technology robbers can no longer decrypt or hack transmitted information,” he claims.
This breakthrough has widespread economic and global applications. Quantum cryptography has been used in rare instances, primarily Swiss banks, but is limited by its short transmission distance and slow speed. Verma and his research team’s technology demonstration suggest the potential for breaking those barriers.
“As we continue to test this promising method of quantum cryptology, we can demonstrate its value and accelerate the adoption in the business world,” Verma said.