Untappable quantum communications?

In summary, quantum key distribution uses entanglement to create a shared encryption key between two parties, who then use regular communication channels to transmit their message. This prevents eavesdropping as the key cannot be accessed without knowledge of the entanglement. However, a man-in-the-middle attack is still possible if the attacker controls all communication channels. Tampering with the entangled particles will result in different keys being generated, which can be detected through the use of the classical channel.
  • #1
GTOM
955
64
Could please someone explain me, if entanglement can't be used to direct communication (that would be an FTL dream come through) how untappable quantum communication supposed to work?
If regular data transmit still needed to get any useful information out of the entangled particles, why it can't be tapped? What if someone could get acces to entanglement / distributer / repeater node itself?
 
Physics news on Phys.org
  • #2
GTOM said:
Could please someone explain me, if entanglement can't be used to direct communication (that would be an FTL dream come through) how untappable quantum communication supposed to work?
It isn't, if you are talking about using entanglement for communication. There IS no meaningful / useful communication via entanglement
If regular data transmit still needed to get any useful information out of the entangled particles, why it can't be tapped?
What do you mean? It CAN be tapped, if you are talking about the non-FTL communication and it doesn't exist if you are talking about FTL communications.
What if someone could get acces to entanglement / distributer / repeater node itself?
As far as I can tell, that sentence makes no sense.
 
  • #3
GTOM said:
If regular data transmit still needed to get any useful information out of the entangled particles, why it can't be tapped?
Alice and Bob use entanglement to create an encryption key that is known only to them. Once they have that key, they use ordinary symmetric-key encryption to send their message through the regular channel. Eve, the eavesdropper, can tap the regular channel, but without the key she cannot get any information from it.
What if someone could get acces to entanglement / distributer / repeater node itself?
They would be able to shut the key-generation system down, but that's all. They would not be able to manipulate it in such a way that they could learn the keys that Alice and Bob are generating.
(Quantum key distribution is vulnerable to a man-in-the-middle attack, but this attack requires control of the classical channel).
 
  • Like
Likes GTOM
  • #4
The point of quantum cryptography is not to make eavesdropping impossible, but fully detectable.
 
  • Like
Likes PeroK
  • #5
Nugatory said:
Alice and Bob use entanglement to create an encryption key that is known only to them. Once they have that key, they use ordinary symmetric-key encryption to send their message through the regular channel. Eve, the eavesdropper, can tap the regular channel, but without the key she cannot get any information from it.

They would be able to shut the key-generation system down, but that's all. They would not be able to manipulate it in such a way that they could learn the keys that Alice and Bob are generating.

Thank you. But i still don't understand it fully.

So basic 1 : quantum information can't be cloned, any measurement change it, and we can't get all information in a single measurement
basic 2 : in case of entanglement tampering with one side means the other side instantly (or at least faster than light, unknown max distance) reacts, but next point
basic 3 : no matter how great it sounds, we CANT use it for signaling, since coherence is destroyed instantly, and before measurement we can't be even sure whether it in is state A or B, so it means nothing if we find 2 particles in state A and 3 in state B

I hope i managed to get the basics right.

So how eavesdropping is detected, how do we know, that a spy tampered with the particles, and not our measurement broke the coherence? The information is changed, but doesn't entanglement means it changed on both side?
Is it because info teleportation, that we add info C to an entangled pair, and it appears on the other side if coherence still stands? And even if the other side don't know, that whether the result is A+C or B+C or A+D (still no signaling useful data) we can count on that both sides have the same key?

What about noisy quantum key distribution channel? That could destroy coherence too, so redundancy is needed, is there a clear difference between tapping and simple noise?

(Quantum key distribution is vulnerable to a man-in-the-middle attack, but this attack requires control of the classical channel)

What does exactly vulnerable means in this case, and what the attacker could achieve?
 
  • #6
You'll find much good stuff if you google for "quantum key distribution"; the wikipedia article is a good start. But some quick answers:
1) If there is any tampering Alice and Bob will end up creating different keys. This becomes apparent the first time they exchange messages, but no sooner. There is no way of detecting tampering or attempted eavesdropping without transmitting information on the classical channel.
2) The man-in-the-middle attack is the same as for non-quantum cryptography. If Mallory controls all communication channels between Alice and Bob, he can impersonate Alice and he go through the key exchange protocol with Bob, and vice versa with Alice. Now when Bob believes that he's sending a secure message to Alice encrypted with the key he negotiated with Alice, he's actually sending it to Mallory, who decrypts it, reads it, then reencrypts it using the key he has negotiated with Alice and sends it on to her.
 
  • Like
Likes GTOM
  • #7
Nugatory said:
You'll find much good stuff if you google for "quantum key distribution"; the wikipedia article is a good start. But some quick answers:
1) If there is any tampering Alice and Bob will end up creating different keys. This becomes apparent the first time they exchange messages, but no sooner. There is no way of detecting tampering or attempted eavesdropping without transmitting information on the classical channel.
2) The man-in-the-middle attack is the same as for non-quantum cryptography. If Mallory controls all communication channels between Alice and Bob, he can impersonate Alice and he go through the key exchange protocol with Bob, and vice versa with Alice. Now when Bob believes that he's sending a secure message to Alice encrypted with the key he negotiated with Alice, he's actually sending it to Mallory, who decrypts it, reads it, then reencrypts it using the key he has negotiated with Alice and sends it on to her.

All communication channels between Alice and Bob, AND the quantum key distributor unit, do i get it right?Otherwise i found this one.

https://phys.org/news/2016-10-precise-quantum-cloning-pathway.html

Maybe quantum information cloning isn't that impossible? (Considering, that one has to calculate with regular transmission errors.)
 
  • #8
GTOM said:
All communication channels between Alice and Bob, AND the quantum key distributor unit, do i get it right?Otherwise i found this one.

https://phys.org/news/2016-10-precise-quantum-cloning-pathway.html

Maybe quantum information cloning isn't that impossible? (Considering, that one has to calculate with regular transmission errors.)

The problem of cloning is traditionally badly covered in discussions of QKD. Usually, the no-cloning theorem is shown for a general case, which is almost trivial, while the case of finite sets, the most relevant and interesting but difficult, is silently omitted.

There's no problem in distinguishing orthogonal states and, therefore, states from such finite sets can be easily cloned. Once states are not orthogonal, however, the best one can do is to clone a state with some probability and to know when cloning failed. If in QKD failed attempts are substituted by random states, this will show up as noise in subsequent key distillation. Thus, noise can be tolerated only up to a certain level, above which the communication should be regarded as insecure. This is the standard approach.

Nevertheless, no-cloning is still there and not going anywhere. It's a shame that the trend in public releases, and sometimes original publications, is to hide this fact.
 
  • Like
Likes GTOM

Related to Untappable quantum communications?

1. What is untappable quantum communications?

Untappable quantum communications refer to a method of sending and receiving information that is impossible to intercept or hack into. This is achieved through the use of quantum mechanics, which allows for the creation of unbreakable codes and secure communication channels.

2. How does untappable quantum communications work?

Untappable quantum communications use the principles of quantum entanglement and superposition to create a secure communication channel. This involves encoding information onto individual particles and sending them to a receiver, where they are decoded using quantum mechanics. Any attempt to intercept or measure these particles would result in a change in their state, alerting the sender and rendering the information unreadable to the interceptor.

3. What are the advantages of untappable quantum communications?

The main advantage of untappable quantum communications is its high level of security. As it is based on the principles of quantum mechanics, it is virtually impossible for hackers or eavesdroppers to intercept or decipher the information being transmitted. This makes it particularly useful for sensitive communications, such as government or military communications, and for protecting sensitive data.

4. Are there any downsides to untappable quantum communications?

One potential downside of untappable quantum communications is its current limitations in terms of distance and scalability. The technology is still in its early stages and is currently only effective over short distances. Additionally, it requires specialized equipment and expertise, making it more expensive and less accessible than traditional communication methods.

5. What are the potential applications of untappable quantum communications?

Untappable quantum communications have a wide range of potential applications, particularly in fields that require high levels of security and privacy. Some examples include secure communication for government and military purposes, secure financial transactions, and secure communication for healthcare and medical purposes. It could also potentially be used to enhance the security of internet and telecommunications networks.

Similar threads

  • Quantum Physics
Replies
2
Views
804
  • Quantum Physics
Replies
1
Views
1K
Replies
56
Views
5K
Replies
8
Views
2K
Replies
24
Views
1K
  • Quantum Physics
Replies
3
Views
1K
Replies
9
Views
1K
Replies
13
Views
2K
  • Quantum Physics
Replies
13
Views
2K
Back
Top