Quantum cryptography system for a secure transmission of...

Cryptography – Key management

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S001000, C380S044000, C380S044000

Reexamination Certificate

active

06748081

ABSTRACT:

BACKGROUND INFORMATION
Available quantum cryptography systems are referenced in Quantum Opt. -
3
201 (1991), by S. F. Seward et al., Phys. Rev. Lett.
68
3121 (1992), by Ch. Bennet, Electronics Letters
30
1875 (1994), by P. D. Townsend et al., and Electronics Letters
31
232 (1995), by I. D. Franson et al.
Quantum cryptography is a method for a secure transmission of random keys, used to encrypt messages, over publicly accessible optical communication channels. Attempts to intercept the message disturb key generation by changing the exchanged quantum states of the light, with the result that the information encrypted by the key cannot be used. Attempts to intercept the message can be detected.
A message can be transmitted securely only if it generally cannot be intercepted or comprehended, even by the network operator himself. For this purpose, a random key of the same length as the message itself must be reliably exchanged between the transmitter and receiver. Quantum optical methods, which are described briefly below, have been suggested for this purpose.
The various physical properties of the quantum state of light cannot be measured precisely at the same time. This is felt the most strongly with polarization. Because the latter is composed of two independent directions of polarization, and the polarization analysis involves detecting a photon behind an analyzer (and thus destroying it), a single measurement can identify only one component of the polarization state at a time, while the others remain unidentified.
An eavesdropper must measure the photon he has intercepted and then replace it so that its absence is not detected. However, he cannot precisely identify the polarization state and therefore cannot obtain any precise information and also has no way to precisely duplicate the photon. The secure distribution of a statistical key between a transmitter and a receiver takes advantage of this fact. The transmitter and receiver can precisely receive the message since they subsequently exchange additional information about the base system in which the polarization is measured. This information is of no use to the eavesdropper.
A feature of conventional quantum cryptography methods is the ability to switch a polarizer at the transmitter's location and switch an analyzer at the receiver's location. Electrooptical modulators which either contain an electrooptical switch that transmits the light to individual, permanently set polarizers or analyzers on preset channels, as suggested in Mod. Optics
41
2405, by J. Breguet et al., or which are designed as switchable retarding elements as suggested in Mod. Optics
41
2425 (1994) written by P. Townsend et al. are used for this purpose.
FIG. 1
shows a principle of a conventional quantum cryptography device according to the polarization setting method. The transmitter has a single-photon source
2
, such as a reduced-power laser, while the receiver has a detector for detecting individual photons
6
, and both have a polarization setter, such as a linearly polarizing analyzer which can be rotated into positions x, x′, y or y′ (e.g., a polarizer
3
, an analyzer
5
, with a glass fiber
4
connecting).
The transmitter and receiver are connected by a quantum channel
1
in which individual photons are transmitted without any active amplification, as well as by a conventional line, such as a telephone or radio connection. Two random number generators independently adjust the analyzers at the transmitting and receiving ends each time an individual quantum state (photon) is transmitted.
An interferbmetric phase measurement for distributing the keys according to quantum cryptographic means can also be used instead of the polarization measurement, as suggested in Mod. Optics
41
2425 (1994), by P. Townsend et al. To do this, a defined optical path must be inserted into two interferometers at the transmitting and receiving ends. This can be done by adjusting a mirror or by electrooptical retardation in suitable materials, such as lithium niobate.
In available quantum cryptography systems according to the polarization setting method, which actually permit high speeds via the transmission channels, there are long switching times of the optical modulators used for this purpose.
SUMMARY OF THE INVENTION
An object of the present invention is to provide a faster quantum cryptography system according to the polarization setting method.
A quantum cryptography system according to the present invention uses electrooptical liquid crystal modulators which change the polarization and which are designed as electrically rotatable retardation plates whose two birefringent axes are rotated by the applied electrical field around an angle &thgr; which depends on the strength of this field. Thus, a &lgr;/2 retardation plate rotates the elliptically polarized light striking the plate around an angle 2&thgr; at speeds in the microsecond range. The quantum cryptography system can be used for interception-proof data transmission over transmission links that are accessible to the public.


REFERENCES:
patent: 5757912 (1998-05-01), Blow
patent: 5764765 (1998-06-01), Phoenix et al.
patent: 5768378 (1998-06-01), Townsend et al.
patent: 5953421 (1999-09-01), Townsend
patent: 196 24 769 (1998-01-01), None
patent: WO 88/06303 (1988-08-01), None
patent: WO 90/09614 (1990-08-01), None
patent: WO 96/07951 (1996-03-01), None
Bethune, et al., IEEE Journal of Quantum Electronics, vol. 36 No. 3 , Mar. 2000, pp. 340-347.*
G. Andersson et al., “Device physics of the soft-mode electro-optic effect”, J. Appl. Phys. 66 (10), Nov. 15, 1989 pp. 4983-4995.
Townsend et al., “Design of quantum cryptography systems for passive optical networks”, Electronics Letters, Oct. 27, 1994, vol. 30, No. 22, pp. 1875-1877.
Franson et al., “Operational system for quantum cryptography”, Electronics Letters, Feb. 2, 1995, vol. 31, No. 3, pp. 232-234.
Seward et al., “Daylight demonstration of a low-light-level communication system using correlated photon pairs”, Quantum Opt. 3 (1991) pp. 201-207.
Bennett, “Quantum Cryptography Using Any Two Nonorthgonal States”, Phys Rev. Lett. vol. 68, No. 21, pp. 3121-3124.
Townsend et al., “A quantum key distribution channel based on optical fibre”, Journal of Modern Optics, 1994, vol. 41, No. 12, 2425-2433.
Breguet et al., “Quantum cryptography with polarized photons in optical fibers”, Journal of Modern Optics, 1994, vol. 41, No. 12, 2405-2412.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Quantum cryptography system for a secure transmission of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Quantum cryptography system for a secure transmission of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Quantum cryptography system for a secure transmission of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3305841

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.