Notice: A non well formed numeric value encountered in D:\InetPub\vhosts\\\default\wp-content\plugins\crayon-syntax-highlighter\crayon_formatter.class.php on line 118

Notice: A non well formed numeric value encountered in D:\InetPub\vhosts\\\default\wp-content\plugins\crayon-syntax-highlighter\crayon_formatter.class.php on line 119

The weak spot when dealing with key distribution is … the key being distributed. More precisely, you cannot know for sure the key has not been hijacked somewhere in between. If hijacked the key can be read. copied and re-sent without the receiver or sender knowing about it. Quantum computing helps here because:

  • one cannot clone qubit. While bits can be cloned and re-transferred with qubits you can only instantiate new ones. Of course, new qubits with a particular value are indistinguishable of older ones with the same value but this assumes you know the value of the old ones.
  • when you read a qubit you destroy it. Not literally making it disappear, but the collapse of the wave-function cannot be rolled back. A quantum state has no memory of how it was before a measurement turned (i.e. forced) it into a particular state. If you measure it, you alter it.

Taken together, this means that any attempt to measure or clone a qubit will alter the qubit or fail respectively. If two parties exchange a series of qubits they can detect if a third party tried to fiddle with the series and this is the essence of the BB84 protocol. From a philosophical point of view the essence of it relies on the fact that no-one, not anybody can see beyond the quantum randomness. When you collapse a quantum particle there is absolutely no way to tell where is will go (if using a different base than the original).

The BB84 protocol uses a quantum and a classical channel. Both channels can be completely open; anyone can listen but only the sender and receiver will in the end know the shared key. You can have only one received because any other will appear as eavesdropping. The algorithm goes as follows (using as usual Bob, Alice and Eve):

  • Alice uses a light source to create a photon. Any two-state qubit realization is fine as well.
  • The photon is sent through a polarizer and randomly given one of four possible polarization and bit designations — Vertical (One bit), Horizontal (Zero bit), 45 degree right (One bit), or 45 degree left (Zero bit).
  • The photon travels to Bob’s location.
  • Bob has two beamsplitters — a diagonal and vertical/horizontal – and two photon detectors.
  • Bob randomly chooses one of the two beamsplitters and checks the photon detectors.
  • The process is repeated until the entire key has been transmitted to Bob.
  • Bob then tells Alice in sequence which beamsplitter he used.
  • Alice compares this information with the sequence of polarizers she used to send the key.
  • Alice tells Bob where in the sequence of sent photons he used the right beamsplitter.
  • Now both Alice and Bob have a sequence of bits (sifted key) they both know.

The important part in this is that the actual bits, i.e. the actual measurement values, are not shared. The series of polarization filters are shared but not the bits. Together with the uncertainty inherent to the measurement it means that anyone can listen but can only guess what the measurement has yield.

Provided Alice and Bob perform this type of exchange long enough they will end up with a key of a certain length. Also note that the potential errors between the two parties could be due to the inevitable noise, so the detection of eavesdropping is bound to some threshold rathe than a true/false.

Below is a fun implementation of the B84 process. The essence of the quantum sits in the measurement function:


Read the original article by Bennett and Brassart entitled “Quantum cryptography: public key distribution and coin tossing”.