Tag Archives: John C. Howell

Unbreakable encrypted message with key that’s shorter than the message

A Sept. 5, 2016 University of Rochester (NY state, US) news release (also on EurekAlert), makes an intriguing announcement,

Researchers at the University of Rochester have moved beyond the theoretical in demonstrating that an unbreakable encrypted message can be sent with a key that’s far shorter than the message—the first time that has ever been done.

Until now, unbreakable encrypted messages were transmitted via a system envisioned by American mathematician Claude Shannon, considered the “father of information theory.” Shannon combined his knowledge of algebra and electrical circuitry to come up with a binary system of transmitting messages that are secure, under three conditions: the key is random, used only once, and is at least as long as the message itself.

The findings by Daniel Lum, a graduate student in physics, and John Howell, a professor of physics, have been published in the journal Physical Review A.

“Daniel’s research amounts to an important step forward, not just for encryption, but for the field of quantum data locking,” said Howell.

Quantum data locking is a method of encryption advanced by Seth Lloyd, a professor of quantum information at Massachusetts Institute of Technology, that uses photons—the smallest particles associated with light—to carry a message. Quantum data locking was thought to have limitations for securely encrypting messages, but Lloyd figured out how to make additional assumptions—namely those involving the boundary between light and matter—to make it a more secure method of sending data.  While a binary system allows for only an on or off position with each bit of information, photon waves can be altered in many more ways: the angle of tilt can be changed, the wavelength can be made longer or shorter, and the size of the amplitude can be modified. Since a photon has more variables—and there are fundamental uncertainties when it comes to quantum measurements—the quantum key for encrypting and deciphering a message can be shorter that the message itself.

Lloyd’s system remained theoretical until this year, when Lum and his team developed a device—a quantum enigma machine—that would put the theory into practice. The device takes its name from the encryption machine used by Germany during World War II, which employed a coding method that the British and Polish intelligence agencies were secretly able to crack.

Let’s assume that Alice wants to send an encrypted message to Bob. She uses the machine to generate photons that travel through free space and into a spatial light modulator (SLM) that alters the properties of the individual photons (e.g. amplitude, tilt) to properly encode the message into flat but tilted wavefronts that can be focused to unique points dictated by the tilt. But the SLM does one more thing: it distorts the shapes of the photons into random patterns, such that the wavefront is no longer flat which means it no longer has a well-defined focus. Alice and Bob both know the keys which identify the implemented scrambling operations, so Bob is able to use his own SLM to flatten the wavefront, re-focus the photons, and translate the altered properties into the distinct elements of the message.

Along with modifying the shape of the photons, Lum and the team made use of the uncertainty principle, which states that the more we know about one property of a particle, the less we know about another of its properties. Because of that, the researchers were able to securely lock in six bits of classical information using only one bit of an encryption key—an operation called data locking.

“While our device is not 100 percent secure, due to photon loss,” said Lum, “it does show that data locking in message encryption is far more than a theory.”

The ultimate goal of the quantum enigma machine is to prevent a third party—for example, someone named Eve—from intercepting and deciphering the message. A crucial principle of quantum theory is that the mere act of measuring a quantum system changes the system. As a result, Eve has only one shot at obtaining and translating the encrypted message—something that is virtually impossible, given the nearly limitless number of patterns that exist for each photon.

The paper by Lum and Howell was one of two papers published simultaneously on the same topic. The other paper, “Quantum data locking,” was from a team led by Chinese physicist Jian-Wei Pan.

“It’s highly unlikely that our free-space implementation will be useful through atmospheric conditions,” said Lum. “Instead, we have identified the use of optic fiber as a more practical route for data locking, a path Pan’s group actually started with. Regardless, the field is still in its infancy with a great deal more research needed.”

Here’s a link to and a citation for the paper,

Quantum enigma machine: Experimentally demonstrating quantum data locking by Daniel J. Lum, John C. Howell, M. S. Allman, Thomas Gerrits, Varun B. Verma, Sae Woo Nam, Cosmo Lupo, and Seth Lloyd. Phys. Rev. A, Vol. 94, Iss. 2 — August 2016 DOI: http://dx.doi.org/10.1103/PhysRevA.94.022315

©2016 American Physical Society

This paper is behind a paywall.

There is an earlier open access version of the paper by the Chinese researchers on arXiv.org,

Experimental quantum data locking by Yang Liu, Zhu Cao, Cheng Wu, Daiji Fukuda, Lixing You, Jiaqiang Zhong, Takayuki Numata, Sijing Chen, Weijun Zhang, Sheng-Cai Shi, Chao-Yang Lu, Zhen Wang, Xiongfeng Ma, Jingyun Fan, Qiang Zhang, Jian-Wei Pan. arXiv.org > quant-ph > arXiv:1605.04030

The Chinese team’s later version of the paper is available here,

Experimental quantum data locking by Yang Liu, Zhu Cao, Cheng Wu, Daiji Fukuda, Lixing You, Jiaqiang Zhong, Takayuki Numata, Sijing Chen, Weijun Zhang, Sheng-Cai Shi, Chao-Yang Lu, Zhen Wang, Xiongfeng Ma, Jingyun Fan, Qiang Zhang, and Jian-Wei Pan. Phys. Rev. A, Vol. 94, Iss. 2 — August 2016 DOI: http://dx.doi.org/10.1103/PhysRevA.94.020301

©2016 American Physical Society

This version is behind a paywall.

Getting back to the folks at the University of Rochester, they have provided this image to illustrate their work,

The quantum enigma machine developed by researchers at the University of Rochester, MIT, and the National Institute of Standards and Technology. (Image by Daniel Lum/University of Rochester)

The quantum enigma machine developed by researchers at the University of Rochester, MIT, and the National Institute of Standards and Technology. (Image by Daniel Lum/University of Rochester)

Quantum and classical physics may be closer than we thought

It seems that a key theory about the boundary between the quantum world and our own macro world has been disproved and I think the July 21, 2015 news item on Nanotechnology Now says it better,

Quantum theory is one of the great achievements of 20th century science, yet physicists have struggled to find a clear boundary between our everyday world and what Albert Einstein called the “spooky” features of the quantum world, including cats that could be both alive and dead, and photons that can communicate with each other across space instantaneously.

For the past 60 years, the best guide to that boundary has been a theorem called Bell’s Inequality, but now a new paper shows that Bell’s Inequality is not the guidepost it was believed to be, which means that as the world of quantum computing brings quantum strangeness closer to our daily lives, we understand the frontiers of that world less well than scientists have thought.

In the new paper, published in the July 20 [2015] edition of Optica, University of Rochester [New York state, US] researchers show that a classical beam of light that would be expected to obey Bell’s Inequality can fail this test in the lab, if the beam is properly prepared to have a particular feature: entanglement.

A July 21, 2015 University of Rochester news release, which originated the news item, reveals more about the boundary and the research,

Not only does Bell’s test not serve to define the boundary, the new findings don’t push the boundary deeper into the quantum realm but do just the opposite. They show that some features of the real world must share a key ingredient of the quantum domain. This key ingredient is called entanglement, exactly the feature of quantum physics that Einstein labeled as spooky. According to Joseph Eberly, professor of physics and one of the paper’s authors, it now appears that Bell’s test only distinguishes those systems that are entangled from those that are not. It does not distinguish whether they are “classical” or quantum. In the forthcoming paper the Rochester researchers explain how entanglement can be found in something as ordinary as a beam of light.

Eberly explained that “it takes two to tangle.” For example, think about two hands clapping regularly. What you can be sure of is that when the right hand is moving to the right, the left hand is moving to the left, and vice versa. But if you were asked to guess without listening or looking whether at some moment the right hand was moving to the right, or maybe to the left, you wouldn’t know. But you would still know that whatever the right hand was doing at that time, the left hand would be doing the opposite. The ability to know for sure about a common property without knowing anything for sure about an individual property is the essence of perfect entanglement.

Eberly added that many think of entanglement as a quantum feature because “Schrodinger coined the term ‘entanglement’ to refer to his famous cat scenario.” But their experiment shows that some features of the “real” world must share a key ingredient of Schrodinger’s Cat domain: entanglement.

The existence of classical entanglement was pointed out in 1980, but Eberly explained that it didn’t seem a very interesting concept, so it wasn’t fully explored. As opposed to quantum entanglement, classical entanglement happens within one system. The effect is all local: there is no action at a distance, none of the “spookiness.”

With this result, Eberly and his colleagues have shown experimentally “that the border is not where it’s usually thought to be, and moreover that Bell’s Inequalities should no longer be used to define the boundary.”

Here’s a link to and a citation for the paper,

Shifting the quantum-classical boundary: theory and experiment for statistically classical optical fields by Xiao-Feng Qian, Bethany Little, John C. Howell, and J. H. Eberly. Optica Vol. 2, Issue 7, pp. 611-615 (2015) •doi: 10.1364/OPTICA.2.000611

This paper is open access.