Skip to Content

Physicists Test Quantum Cryptography For Handheld Mobile Devices

Quantum cryptography has only ever been possible between places equipped like quantum optics laboratories. Now physicists have worked out how to do it with handheld mobile devices

Quantum cryptography uses the laws of physics to guarantee the secrecy of messages sent from one location to another. It is one of the few quantum technologies that is become mature enough to make the leap from the laboratory to the commercial world.


So governments, the military and commercial organisations such as banks are all interested having this kind of perfect secrecy. And indeed a number of companies have cropped up in the last 10 years to sell the service.

One problem is that quantum cryptography is only possible between places that have the kind of gear usually only found in quantum optics laboratories. It generally requires that both the transmitter and receiver have a source of single photons, a way of controlling and modifying individual photons and superconducting photon detectors.

What’s more, the equipment at each end has to be carefully aligned so that both parties are able to detect the polarisation of the photons they send. And if there is any noise that changes the polarisation of the photons, the cryptography simply doesn’t work.

That scuppers any possibility of using quantum cryptography with handheld devices which would obviously be difficult to align.

Today, Jeremy O’Brien at the University of Bristol and a few pals reveal a way to solve this problem which they say could make quantum cryptography available in handheld machines.

In the new technique, only one of the parties, Alice say, needs to have the quantum optics gear such as a source of photons and so on. Alice creates the photons and then sends them down an ordinary optical fibre to Bob, the other party.

Bob, merely modifies the photons to encode them with information before sending them back to Alice. This dramatically simplifies the equipment Bob requires, allowing it to fit in a handheld device.

O’Brien and co also use a robust form of quantum key distribution that does not require Alice and Bob to align their equipment before making a measurement.

Instead Alice and Bob make measurements in random directions and then publish the list of directions for anyone to see. Only those measurements that happened to be aligned contribute to the code.

As long as the alignment between Alice and Bob’s devices changes slowly compared to the rate at which photons pass back and forth between them, this mechanism works pretty well. O’Brien and co call the new technique “reference frame independent quantum key distribution” or rfiQKD.

O’Brien and co compare the new technique to a conventional quantum cryptography protocol known as BB84 and it comes off well. When the team deliberately add noise to simulate a change in alignment, the BB84 protocol immediately stops working.

By contrast, rfiQKD is much more robust. It works when noise levels are high and even when it becomes overwhelmed, it begins running again as soon as noise levels drops, unlike the BB84 protocol. “We demonstrated the automatic, passive recovery capability of our system after periods of rapid and substantial noise that force a protocol failure,” say the team.

The end result is a system that has the potential to bring quantum cryptography to a much wider range of applications than has been possible before now, say O’Brien and co. “The results significantly broaden the operating potential for QKD outside of the laboratory and pave the way for quantum enhanced security for the general public with handheld mobile devices.”

Ref: arxiv.org/abs/1308.3436 : Reference Frame Independent Quantum Key Distribution Server With Telecom Tether For On-Chip Client

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.