Modern schemes for exchanging secret messages, such as the one-time pad and public key procedures that we saw in Chapter 4, rely on the sender and receiver to possess certain “keys.” Such keys are simply large numbers that have been carefully constructed so as to have special mathematical properties. If the appropriate keys are known, then any encrypted messages are easily unscrambled. But without the keys it is computationally intractable, at least with any classical computer, to crack a coded message. Consequently, the integrity of these cryptosystems relies on the keys being kept secret.
KeywordsSecret Message Quantum Cryptography Calcite Crystal Polarization Orientation Polarize Photon
Unable to display preview. Download preview PDF.
- Bennett, C, Bessette, F., and G. Brassard. “Experimental Quantum Cryptography,” Lecture Notes in Computer Science, Vol. 473, Springer-Verlag, Berlin, pp. 253–265 (1991).Google Scholar
- Bennett, G, Brassard, G. and A. Ekert. “Quantum Cryptography,” Scientific American, October, pp. 50–57 (1992).Google Scholar
- Buttler, W., Hughes, R., Kwiat, P., Luther, G., Morgan, G., Nordholt, J., Peterson, G, and C. Simmons. “Free-Space Quantum Key Distribution,” Los Alamos preprint archive, http://xxx.lanl.gov/archive/quant-ph/9801006 (1998).
- Buttler, W., Hughes, R., Kwiat, P., Lamoreaux, S., Luther, G., Morgan, G., Nord-holt, J., Peterson, G, and C. Simmons. “Practical Free-Space Quantum Key Distribution Over 1 Kilometer,” Los Alamos preprint archive, http://xxx.lanl.gov/archive/quant-ph/9805071 (1998).
- Deutsch, D. “Quantum Communication Thwarts Eavesdroppers,” New Scientist, December 9, pp. 25–26 (1989).Google Scholar
- Hecht, E., and A. Zajac. Optics, Addison-Wesley, Reading, MA, p. 228 (1974).Google Scholar