Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Intelligent Machines

Quantum Codebook

A Heisenbergian cipher nears practicality

As commerce rushes online, the ability to send private messages over public communications networks has become vitally important. The most secure means of encryption is for both the sender and the recipient of a message to use the same long string of random digits-known as a key-as the basis for encoding and decoding. But such a key must be exchanged, and whether the hand-off takes place via telephone, armored guard or carrier pigeon, there is always a risk of interception.

Well, almost always. Years ago, physicists came up with an approach called “quantum cryptography” that relies upon the bizarre laws of quantum mechanics to definitively shut out snoops and transmit key data in absolute security. IBM physicist Charles Bennett and his colleagues built the first working laboratory prototype in 1989. Now, researchers at IBM Almaden Research Center in San Jose, Calif., have built a device out of off-the-shelf telecommunications components that they say will soon move quantum cryptography out of the physics lab and into the real world.

Dubbed the “quantum cryptolink,” the IBM device encodes bits of key information into individual photons of light by polarizing them in one of two directions. Users can exchange the data-bearing photons across a fiber-optic cable over short distances. Security is guaranteed by Heisenberg’s uncertainty principle, which says it’s impossible for an eavesdropper to observe the photons without disturbing them. If the sender and legitimate recipient see signs of spying, they can throw out all or part of the key and try again.

This story is part of our March/April 1999 Issue
See the rest of the issue
Subscribe

To build the cryptolink, a team led by Nabir Amer, manager of IBM’s quantum information group, had to solve a number of practical problems. For instance, they implemented a signal-processing scheme to cancel out the errors that real-world fiber-optic networks introduce and which can leave a foothold for eavesdroppers to pilfer photons undetected. The biggest remaining challenge, according to IBM team member Bill Risk, is the ultra-sensitive photon detectors that must be chilled with liquid nitrogen to -173 C. Risk says new detectors cooled thermoelectrically should solve the problem.

By year’s end, Amer estimates, his lab will engineer “a prototype of a card you can plug into a network.” Although IBM doesn’t yet have specific plans for commercializing the cryptolink, Amer says it might be used to provide secure islands on corporate or government computer networks, or to protect citywide networks of automated teller machines.

But Tom Parenty, director of data and communications security at Emeryville, Calif., software firm Sybase, says that “even though quantum cryptography may offer 100 percent secure communication, my feeling is that it’s overkill for 99 percent of applications.” Standard cipher systems, some of which don’t require secure key exchange, can already ward off all but concerted attacks backed by massive computing power.

Amer believes that such ciphers could be rendered useless by another device in the works at IBM-the quantum computer. “If we ever have a quantum computer,” says Amer, it would compute fast enough to crack today’s codes “in a jiffy,” and only its cryptographic equal could ensure safe communication.

Meet the Experts in AI, Robotics and the Economy at EmTech Next.

Learn more and register
More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe and become an Insider.
  • Insider Plus {! insider.prices.plus !}* Best Value

    {! insider.display.menuOptionsLabel !}

    Everything included in Insider Basic, plus the digital magazine, extensive archive, ad-free web experience, and discounts to partner offerings and MIT Technology Review events.

    See details+

    Print + Digital Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

    Technology Review PDF magazine archive, including articles, images, and covers dating back to 1899

    10% Discount to MIT Technology Review events and MIT Press

    Ad-free website experience

  • Insider Basic {! insider.prices.basic !}*

    {! insider.display.menuOptionsLabel !}

    Six issues of our award winning print magazine, unlimited online access plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    Print Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

  • Insider Online Only {! insider.prices.online !}*

    {! insider.display.menuOptionsLabel !}

    Unlimited online access including articles and video, plus The Download with the top tech stories delivered daily to your inbox.

    See details+

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.