Advance opens door for secure quantum applications without specialized infrastructure

  • knightly the Sneptaur@pawb.social
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 hours ago

    It’s physically impossible to intercept an entangled photon without disrupting the entanglement. The act of observing the photon collapses the quantum uncertainty of it’s state, so even the most sophisticated MitM attempt is going to immediately break the link.

    • Opisek@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 hours ago

      But can you detect the link being broken by someone other than your intended communication partner?

      If A sends a particle to B, couldn’t M intercept A’s particle and send a different particle to B? Kind of like intercepting Diffie Hellman. A and B will both share some information with M, but not with each other.

      • Maxxie@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 hours ago

        M cannot replicate the particle after they read it, so A and B will detect M’s attempt when they compare results.

        The same as classical one-way encryption, it only works through authenticated channel tho. It’s not magic, you have to have some kind of pre-existing secret or rely on third-party authentication

      • knightly the Sneptaur@pawb.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        4 hours ago

        But can you detect the link being broken by someone other than your intended communication partner?

        Yes, because breaking the entanglement destroys the link between the photons received at either end.

        Observing an entangled photon requires extremely precise timing, the lightspeed lag on the line has to be known down to the nanosecond to ensure that the photon received is paired with the photon at the other end. Even if a MitM wanted to try retransmitting the quantum states it observes on the line, they wouldn’t be able to do so without introducing enough lag to desync the connection.

        Alternatively, if M tried sending their own random data in sync with the expected timing, then the bits received by B would only have a 50-50 chance of matching the bits sent from A. Any encryption based on that data would almost immediately begin to suffer a 100% error rate.