create account

Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography by procrastilearner

View this thread on: hive.blogpeakd.comecency.com
· @procrastilearner ·
$17.03
Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography
<div class="pull-left">https://steemitimages.com/DQmaYH2iwMSeAem2YEPEbUtBYHH1WV4k4vaXVJDKhmgJM4L/image.png</div>

We rely on encryption and passwords for all sorts of things. Anytime you make a purchase online or at a store with a card, encryption is involved.

The encryption is achieved basically by multiplying two large prime numbers together and the resulting, very large number is extremely hard to factor into the original two numbers by a thief or a hacker and this makes your transaction secure. This is what is called a one-way function.

The problem is that it now looks like quantum computers might be coming. I have made a few posts on quantum computers [here](https://steemit.com/steemstem/@procrastilearner/the-online-quantum-computer-that-you-can-use), [here](https://steemit.com/steemstem/@procrastilearner/all-about-qubits) and [here](https://steemit.com/physics/@procrastilearner/testing-the-quality-of-the-ibm-qubit-with-3072-actual-quantum-computer-runs). It's a very interesting topic so you might want to take a look.

If quantum computers ever are fully developed they may be able to quickly factor those large numbers we use for encryption using something called [Shor's algorithm](https://en.wikipedia.org/wiki/Shor's_algorithm) and this would effectively render our modern encryption techniques obsolete.

This could also render a lot of cryptocurrencies obsolete as well.

<center>![](https://steemitimages.com/DQmeBXEQeFe8NjMKk2gs8STw3UQGgyQSPLiVpFcZ9ExQUoZ/image.png)</center>

#### Quantum Cryptography To The Rescue

Over 30 years ago a [scheme](https://en.wikipedia.org/wiki/Quantum_key_distribution#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984)) to use the unique principles of quantum mechanics was developed to make it possible to create a secure one-time pad for later use in the encryption of a message.

It goes as follows.

* There are two polarization bases: one is vertical-horizontal and the other is where the polarizers are rotated by 45°
* Photons that are polarized vertically are defined to represent 0.
* Photons that are polarized horizontally are defined to represent 1.
* Photons that are polarized at 45° are defined to represent 0.
* Photons that are polarized at -45° are defined to represent 1.

<center><b>Table 1. Quantum Cryptography Activity Sequences Explained</b></center>
Activity Description |  | | | | | | | |
--|-- |-- |-- |-- |-- |-- |-- |-- |
Alice's makes her random bits (this is kept secret)| 0 | 1 | 1 |0 |1 |0 |0 |1 |
Alice's random sending polarization gate sequence (this is later shared)| &#43; |&#43; |&#215; |&#43; |&#215; |&#215; |&#215; |&#43; |
Photon polarization Alice sends| &#8593;|&#8594;|&#8600;|&#8593;|&#8600;|&#8599;| &#8599;|&#8594;|
Bob's random measuring polarization gate sequence (this is later shared with Alice)| &#43; |&#215; |&#215; |&#215; |&#43; |&#215;|&#43;|&#43;|
Photon polarization Bob measures |&#8593;|&#8599;|&#8600; |&#8599;|&#8594;|&#8599;|&#8594;|&#8594;|
Bit values that Bob measures (this is kept secret)|0|g|1|g|g|0|g|0|
Public sharing of polarization gate sequences |
Shared secret encryption key for one-time pad | 0 | |1 | | |0 | |1 |
---

'g' means 'garbage'. Due to quantum mechanics, Bob will measure a 0 or a 1 at random. He will save that data but later just through it away when the gate sequences are compared.

The table above was adapted from [wikipedia.](https://en.wikipedia.org/wiki/Quantum_key_distribution#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984)) It was modified by me to hopefully make it easier to understand.

---
The list below in conjunction with the table above illustrate the activities for generating a one time pad using quantum mechanics:

1. Alice chooses a sequence of random bits. This is kept secret.
2. Alice then prepares a polarization sequence at random. This will later be shared with Bob.
3. Alice polarizes her light source, attenuates it down to a single photon and sends that photon over a communication channel to Bob. She does this over and over for each sequence.
4. Bob chooses a polarization sequence at random and uses that to measure each photon that Alice sends.
5. If Bob guesses the polarization correctly he will be able to correctly measure the photon that Alice sends. 
6. If Bob guesses the polarization incorrectly he will just get a random answer from the incoming photon (see the Appendix at the end for an explanation).
7. Bob now has a sequence of digits but he can't use them for encryption just yet.
8. Bob sends his polarization sequence to Alice. It can be over a public channel, it really does not matter. I will explain that later. 
9. Alice tells Bob which times he guessed correctly.
10. For all the gates that Bob guessed incorrectly, he just throws those bits away (the 'g' for garbage bits in my table). Alice does the same.
11. Alice and Bob now both have the same secure one-time pad from the bits they are left. These bits can now be used as a one time pad for encryption of a secret message.

<div class="pull-left">https://steemitimages.com/DQmd3JzVGNw9R9uE9dFHfFjCpvzqaguYex859LreQHhaaRv/image.png</div>


#### Eve Likes To Eavesdrop
Okay, let's say that "evil Eve" is sitting in the middle, detecting these photons and using her polarizer to try to determine Alice's sequence.

Quantum mechanics will not allow you to clone quantum states like this. Every measurement of a photon will destroy the original state.

So Eve will therefore have to guess at what type of photon to send along to Bob after she measures and destroys Alice's original photon.

Also, if Eve guesses the polarization wrong she will just be getting a random bit (0 or 1 at random) due to the nature of quantum mechanics (see Appendix for an explanation). She won't know it is random either, the photon won't "tell" her.

Eve therefore has to send this random bit along to Bob and she will be wrong half the time.

This means that the one-time pad that Bob generates at the end will be different than the one-time pad that Alice generates. When Alice encrypts her message and sends it to Bob, Bob will not be able to decrypt it and he will know right away that something went wrong.

Eve will also have the wrong one time pad because the randomness of the incorrectly gated photons means her encryption sequence will be garbage.

So, the nature of quantum mechanics makes this key generation technique very secure (when implemented correctly by the manufacturers).

#### Closing Words

What does this mean for us?

Well one day quantum computers may make the keys for our cryptocurrencies vulnerable as well as for the encryption for our online banking and shopping.

The nature of one-time pads is perfectly resistant to quantum computers because no algorithm was used in the making of the pad.

This means that eventually we could see a new port on the back of our computers that is just for a fiber optic cable. This cable will run right into your house and to your computer's new port.

The port and its associated chips will then be used to make one-time pads for your banking passwords and for your crptocurrency wallets.

#### Appendix: Photon Polarization and Quantum Mechanics

This little sequence of bullet points should illustrate the quantum nature of measuring polarized photons.

* If you polarize a photon vertically and then send it through a polarizer that is vertical it will go right through it (100% of the time for a perfect polarizer).
* If you polarize a photon vertically and then send it through a polarizer that is horizontal it will get stopped (100% of the time for a perfect polarizer).
* If you polarize a photon vertically and then send it through a polarizer that is tilted at 45° only one-half of the time will it go through. The other half of the time it will get stopped. The effect is random and you never can know ahead of time which photon will make it and which photon will get stopped.

When you polarize a photon vertically it's polarization can be best described not as 'up' but as 'up-like' or 'up-ish'.

It will always go through a vertical polarizer but as you rotate that polarizer away from the vertical the odds of it going through decrease.  It then becomes a matter of quantum chance if it makes through or not. At horizontal the odds drop right down to zero.

*Thank you for reading my post.*
</center>

#### Post Sources
&nbsp;
A bit of the information was gathered from this [video.](https://www.youtube.com/watch?v=ToOLbdrWst4)
as well as this Wikipedia [article.](https://en.wikipedia.org/wiki/Quantum_cryptography)
and also this Wikipedia [article.](https://en.wikipedia.org/wiki/Quantum_key_distribution).
The post's title was inspired by this [video.](https://www.youtube.com/watch?v=aKNzbB6a3mQ)
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 100 others
properties (23)
authorprocrastilearner
permlinkhey-can-i-speak-privately-with-you-an-intro-to-quantum-cryptography
categorysteemstem
json_metadata{"tags":["steemstem","physics","technology","steemeducation","technology-trail"],"image":["https://steemitimages.com/DQmaYH2iwMSeAem2YEPEbUtBYHH1WV4k4vaXVJDKhmgJM4L/image.png","https://steemitimages.com/DQmeBXEQeFe8NjMKk2gs8STw3UQGgyQSPLiVpFcZ9ExQUoZ/image.png","https://steemitimages.com/DQmd3JzVGNw9R9uE9dFHfFjCpvzqaguYex859LreQHhaaRv/image.png"],"links":["https://steemit.com/steemstem/@procrastilearner/the-online-quantum-computer-that-you-can-use","https://steemit.com/steemstem/@procrastilearner/all-about-qubits","https://steemit.com/physics/@procrastilearner/testing-the-quality-of-the-ibm-qubit-with-3072-actual-quantum-computer-runs","https://en.wikipedia.org/wiki/Shor's_algorithm","https://en.wikipedia.org/wiki/Quantum_key_distribution#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984)","https://www.youtube.com/watch?v=ToOLbdrWst4","https://en.wikipedia.org/wiki/Quantum_cryptography","https://en.wikipedia.org/wiki/Quantum_key_distribution","https://www.youtube.com/watch?v=aKNzbB6a3mQ"],"app":"steemit/0.1","format":"markdown"}
created2018-03-27 01:35:03
last_update2018-03-27 01:35:03
depth0
children5
last_payout2018-04-03 01:35:03
cashout_time1969-12-31 23:59:59
total_payout_value13.203 HBD
curator_payout_value3.828 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length8,754
author_reputation10,682,012,809,580
root_title"Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd0
post_id46,801,019
net_rshares6,789,861,127,124
author_curate_reward""
vote details (164)
@irelandscape ·
$0.03
Thank you for a very informative post.
For all those wanting to learn more about this and the history of cryptography, I highly recommend reading [The Code Book](https://simonsingh.net/books/the-code-book/) by Simon Singh.
👍  
properties (23)
authorirelandscape
permlinkre-procrastilearner-hey-can-i-speak-privately-with-you-an-intro-to-quantum-cryptography-20180327t112239729z
categorysteemstem
json_metadata{"tags":["steemstem"],"links":["https://simonsingh.net/books/the-code-book/"],"app":"steemit/0.1"}
created2018-03-27 11:22:39
last_update2018-03-27 11:22:39
depth1
children1
last_payout2018-04-03 11:22:39
cashout_time1969-12-31 23:59:59
total_payout_value0.020 HBD
curator_payout_value0.006 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length222
author_reputation15,380,678,988,494
root_title"Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id46,876,607
net_rshares10,825,596,105
author_curate_reward""
vote details (1)
@procrastilearner ·
Yeah, I read that book a while ago. I second that opinion.
properties (22)
authorprocrastilearner
permlinkre-irelandscape-re-procrastilearner-hey-can-i-speak-privately-with-you-an-intro-to-quantum-cryptography-20180327t153144439z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-03-27 15:31:45
last_update2018-03-27 15:31:45
depth2
children0
last_payout2018-04-03 15:31:45
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length58
author_reputation10,682,012,809,580
root_title"Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id46,918,419
net_rshares0
@lemouth ·
$0.03
This was a very clear explanation. I really liked it :)
👍  
properties (23)
authorlemouth
permlinkre-procrastilearner-hey-can-i-speak-privately-with-you-an-intro-to-quantum-cryptography-20180327t071417591z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-03-27 07:14:18
last_update2018-03-27 07:14:18
depth1
children2
last_payout2018-04-03 07:14:18
cashout_time1969-12-31 23:59:59
total_payout_value0.020 HBD
curator_payout_value0.006 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length55
author_reputation338,011,164,701,274
root_title"Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id46,843,153
net_rshares10,956,024,973
author_curate_reward""
vote details (1)
@procrastilearner ·
Thanks. My schtick is that I try to translate the difficult and technical STEM topics so that the average guy on the street can understand it.

Well that's the idea.
properties (22)
authorprocrastilearner
permlinkre-lemouth-re-procrastilearner-hey-can-i-speak-privately-with-you-an-intro-to-quantum-cryptography-20180327t153644176z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-03-27 15:36:48
last_update2018-03-27 15:36:48
depth2
children1
last_payout2018-04-03 15:36:48
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length165
author_reputation10,682,012,809,580
root_title"Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id46,919,318
net_rshares0
@lemouth ·
$0.02
We will like it for sure ^^
👍  
properties (23)
authorlemouth
permlinkre-procrastilearner-re-lemouth-re-procrastilearner-hey-can-i-speak-privately-with-you-an-intro-to-quantum-cryptography-20180327t214326371z
categorysteemstem
json_metadata{"tags":["steemstem"],"app":"steemit/0.1"}
created2018-03-27 21:43:27
last_update2018-03-27 21:43:27
depth3
children0
last_payout2018-04-03 21:43:27
cashout_time1969-12-31 23:59:59
total_payout_value0.024 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length27
author_reputation338,011,164,701,274
root_title"Hey, Can I Speak Privately With You? An Intro To Quantum Cryptography"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id46,974,953
net_rshares9,651,736,286
author_curate_reward""
vote details (1)