You are here:
Home News News Archive Science News (2010) Commercial Quantum Cryptography System Hacked - Bad News for Adrian Kent & others

To read the rest of the article,

Jack Sarfatti says that the above result severely diminishes the work of mainstream quantum cryptographers such as the paper below. The hacker does not even need signal nonlocality to compromise the security.

No Signalling and Quantum Key Distribution

Jonathan Barrett,1, 2, ∗ Lucien Hardy,3, † and Adrian Kent4, ‡

Physique Theorique, Universit ?e Libre de Bruxelles, CP 225, Boulevard du Triomphe, 1050 Bruxelles, Belgium 2Centre for Quantum Information and Communication, CP 165/59, Universite Libre de Bruxelles, Avenue F. D. Roosevelt 50, 1050 Bruxelles, Belgium 3Perimeter Institute, 35 King Street North, Waterloo ON, N2J 2W9, Canada 4Centre for Quantum Computation, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, U.K. (Dated: March 2005 (revised))

"Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced eavesdropper could perhaps use post-quantum physics to extract information from quantum communications without necessarily causing the quantum state disturbances on which existing security proofs rely. Here we describe a key distribution scheme provably secure against general attacks by a post-quantum eavesdropper who is limited only by the impossibility of superluminal signalling. The security of the scheme stems from violation of a Bell inequality."

Category: Science News Archive (2010)

Written by Kim Burrafato

Published on Monday, 17 May 2010 10:16

Hits: 465