Optics 101

How Are Lasers Used for Quantum Cryptography?

During World War II, computational cryptography used hidden messages, ciphering codes and encryption tactics all based in machinery.

Today, cryptography is more widely-used than ever, however, the ciphering codes have developed into complex mathematical algorithms, and ‘cryptography keys’ are produced by merging algorithms with random number generators. This form of cryptography can be seen everywhere from the internet to energy infrastructure to satellite systems.

© metamorworks/Shutterstock.com

These widely-used systems are increasingly under the looming threat of quantum computer technology. These next-generation computers could crack today's most protected systems in mere seconds. To combat this looming threat, agencies around the world are investigating next-generation encryption technologies like quantum key distribution (QKD).

Founded on fundamental physics, QKD allows for two parties to share an encryption key in a manner that is impossible to hack without detection. This feature significantly augments the current methods of key distribution.

QKD involves passing random numbers between two points, through 'entangled' photons, which are then used to produce the encryption key. Hacking this type of communication requires measuring the photons. Measurement permanently alters the quantum qualities of these particles, a shift that would be detected by the parties trying to communicate.

QKD technology is limited when used over standard optical fibre, which confines the distance data can be sent to a few hundred kilometres. Scientific studies have revealed that laser photons can address this issue, as they can be received and sent over long distances, including from satellite to satellite, satellite to ground and ground to satellite. Therefore, a satellite sending a key can pass it to a receiver anywhere on Earth.

Creating entangled pairs of photons

One of the primary aspects of emerging quantum cryptography systems is the use of photon entanglement. Entangled pairs of photons must be produced at the exact same time with identical qualities. This is typically performed through the use of frequency combs.

A frequency comb changes a single wavelength into several wavelengths, producing tens to hundreds of lasers from a single beam. State-of-the-art frequency comb systems are the size of a human hair and use one-thousand times less power to operate than previous iterations. This size and efficiency does allow for mobile applications.

The initial step in creating a frequency comb occurs when the principal laser produces a secondary pair of wavelengths. Due to energy conservation, one wavelength must have more energy and one wavelength must have less energy. These energies must add up to the same energy as the first laser, and the two new wavelengths must be produced at the identical time. Strictly speaking, frequency comb generators can be considered entangled photon generators.

While manageable size and efficiency were major technical developments, there are still numerous integration and production difficulties that must be addressed before the creation of a portable quantum cryptography platform.

Passing a critical test

The quantum cryptography depends on individual photons to transport quantum data. However, even the best optical fibres can carry photons around 200 kilometres. Hence, quantum cryptography has not been possible over long distances, until last year.

In January 2018, China demonstrated the first intercontinental quantum cryptography service. Scientists successfully tested the system by staging up a secure videoconference between Europe and China.

This was feat accomplished using China’s Micius satellite. The orbiting satellite distributed a secure quantum key from using a laser. Micius was in a sun-synchronous orbit over the poles, which meant it moved over every location at approximately the same local time each day.

When the satellite was over the Chinese ground station, it sent the key to the ground using a laser and well-established protocol. As soon as the ground station in Austria came into view, Micius sent the same key using the same system. The two locations then had the same key, allowing them to initiate totally secure communication over a standard connection.

While there are imperfections in the system, the work pointed towards a competent solution for a long-distance global quantum network, laying the foundation for a future quantum Internet.

References:

Disclaimer: The views expressed here are those of the author expressed in their private capacity and do not necessarily represent the views of AZoM.com Limited T/A AZoNetwork the owner and operator of this website. This disclaimer forms part of the Terms and conditions of use of this website.

Brett Smith

Written by

Brett Smith

Brett Smith is an American freelance writer with a bachelor’s degree in journalism from Buffalo State College and has 8 years of experience working in a professional laboratory.

Citations

Please use one of the following formats to cite this article in your essay, paper or report:

  • APA

    Smith, Brett. (2019, March 21). How Are Lasers Used for Quantum Cryptography?. AZoOptics. Retrieved on November 21, 2024 from https://www.azooptics.com/Article.aspx?ArticleID=1508.

  • MLA

    Smith, Brett. "How Are Lasers Used for Quantum Cryptography?". AZoOptics. 21 November 2024. <https://www.azooptics.com/Article.aspx?ArticleID=1508>.

  • Chicago

    Smith, Brett. "How Are Lasers Used for Quantum Cryptography?". AZoOptics. https://www.azooptics.com/Article.aspx?ArticleID=1508. (accessed November 21, 2024).

  • Harvard

    Smith, Brett. 2019. How Are Lasers Used for Quantum Cryptography?. AZoOptics, viewed 21 November 2024, https://www.azooptics.com/Article.aspx?ArticleID=1508.

Tell Us What You Think

Do you have a review, update or anything you would like to add to this article?

Leave your feedback
Your comment type
Submit

While we only use edited and approved content for Azthena answers, it may on occasions provide incorrect responses. Please confirm any data provided with the related suppliers or authors. We do not provide medical advice, if you search for medical information you must always consult a medical professional before acting on any information provided.

Your questions, but not your email details will be shared with OpenAI and retained for 30 days in accordance with their privacy principles.

Please do not ask questions that use sensitive or confidential information.

Read the full Terms & Conditions.