量子通讯有多安全?
文章来源:未知 文章作者:enread 发布时间:2013-05-29 08:06 字体: [ ]  进入论坛
(单词翻译:双击或拖选)
Quantum communication systems offer the promise of virtually unbreakable encryption(加密). Unlike classical encryption, which is used to send secure data over networks today and whose security depends on the difficulty of solving mathematical problems like the factoring of large numbers, most quantum encryption schemes keep the encryption key separate from the data. This approach ensures that an eavesdropper1(偷听者) with access only to the data could not decipher the key. However, researchers have recently demonstrated that even quantum encryption may be susceptible2 to hacking3. In a presentation next month at the Conference on Lasers and Electro-Optics (CLEO: 2013) in San Jose, Calif., Renato Renner of the Institute for Theoretical Physics in Zurich will discuss how he and his team of theoretical physicists4 are working on new ways to calculate the failure probability of certain quantum encryption schemes. The numbers would allow users to estimate how likely it would be that an adversary5 could read their secret messages -- information that is critical for ensuring the overall security of quantum communications.
 
Quantum key distribution (QKD) is a kind of quantum encryption in which a secret password is shared between two distant parties (usually named Alice and Bob in thought experiments). The secret password, or key, is distributed as bits of quantum data, so that if an eavesdropper (usually named Eve) tries to intercept6 the message, the bits will be disturbed and Alice and Bob will know the transmission has been compromised. If the key is not disturbed, it can be used to encode messages that are sent over an insecure channel.
 
"The security of Quantum Key Distribution systems is never absolute," says Renner. He notes that the security of QKD systems depends on three assumptions: the initial secrecy7 of the password, the correctness and completeness of quantum theory, and the reliability8 of the devices in the quantum communication system.
 
Recent work by other research groups has illustrated9 how real-world devices that are not 100 percent reliable can leave weaknesses in quantum communication schemes that may be exploited by a clever hacker10. For example, the photon detectors11 used in QKD should click with a certain probability whenever a photon is detected, but in practice the devices can be "blinded" by a strong light pulse and not click. "In fact, an adversary(对手) may use strong light pulses to 'remotely control' the detector," says Renner.
 
Since such bright light hacking techniques were first demonstrated in 2010, physicists have been keen to find ways to calculate the security of quantum encryption schemes without making assumptions about the reliability of the devices. The quest has generated a lot of interest in a field called device-independent cryptography(密码学).
 
"In device-independent cryptography, the proof of security is based solely12 on directly observable correlations13 between sender and receiver, and it does not matter how these correlations have been established," says Renner. "Even if the detectors were blinded, for instance, as long as they produce the right correlations, a secret key can be extracted from them." This differs from the traditional approach to calculating quantum encryption security, which is only valid14 in the nearly impossible case of the devices working exactly according to theoretical specifications15.


点击收听单词发音收听单词发音  

1 eavesdropper 7342ee496032399bbafac2b73981bf54     
偷听者
参考例句:
  • Now that there is one, the eavesdropper's days may be numbered. 既然现在有这样的设备了,偷窥者的好日子将屈指可数。
  • In transit, this information is scrambled and unintelligible to any eavesdropper. 在传输过程,对该信息进行编码,使窃听者无法获知真正的内容。
2 susceptible 4rrw7     
adj.过敏的,敏感的;易动感情的,易受感动的
参考例句:
  • Children are more susceptible than adults.孩子比成人易受感动。
  • We are all susceptible to advertising.我们都易受广告的影响。
3 hacking KrIzgm     
n.非法访问计算机系统和数据库的活动
参考例句:
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
4 physicists 18316b43c980524885c1a898ed1528b1     
物理学家( physicist的名词复数 )
参考例句:
  • For many particle physicists, however, it was a year of frustration. 对于许多粒子物理学家来说,这是受挫折的一年。 来自英汉非文学 - 科技
  • Physicists seek rules or patterns to provide a framework. 物理学家寻求用法则或图式来构成一个框架。
5 adversary mxrzt     
adj.敌手,对手
参考例句:
  • He saw her as his main adversary within the company.他将她视为公司中主要的对手。
  • They will do anything to undermine their adversary's reputation.他们会不择手段地去损害对手的名誉。
6 intercept G5rx7     
vt.拦截,截住,截击
参考例句:
  • His letter was intercepted by the Secret Service.他的信被特工处截获了。
  • Gunmen intercepted him on his way to the airport.持枪歹徒在他去机场的路上截击了他。
7 secrecy NZbxH     
n.秘密,保密,隐蔽
参考例句:
  • All the researchers on the project are sworn to secrecy.该项目的所有研究人员都按要求起誓保守秘密。
  • Complete secrecy surrounded the meeting.会议在绝对机密的环境中进行。
8 reliability QVexf     
n.可靠性,确实性
参考例句:
  • We mustn't presume too much upon the reliability of such sources.我们不应过分指望这类消息来源的可靠性。
  • I can assure you of the reliability of the information.我向你保证这消息可靠。
9 illustrated 2a891807ad5907f0499171bb879a36aa     
adj. 有插图的,列举的 动词illustrate的过去式和过去分词
参考例句:
  • His lecture was illustrated with slides taken during the expedition. 他在讲演中使用了探险时拍摄到的幻灯片。
  • The manufacturing Methods: Will be illustrated in the next chapter. 制作方法将在下一章说明。
10 hacker Irszg9     
n.能盗用或偷改电脑中信息的人,电脑黑客
参考例句:
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
11 detectors bff80b364ed19e1821aa038fae38df83     
探测器( detector的名词复数 )
参考例句:
  • The report advocated that all buildings be fitted with smoke detectors. 报告主张所有的建筑物都应安装烟火探测器。
  • This is heady wine for experimenters using these neutrino detectors. 对于使用中微子探测器的实验工作者,这是令人兴奋的美酒。 来自英汉非文学 - 科技
12 solely FwGwe     
adv.仅仅,唯一地
参考例句:
  • Success should not be measured solely by educational achievement.成功与否不应只用学业成绩来衡量。
  • The town depends almost solely on the tourist trade.这座城市几乎完全靠旅游业维持。
13 correlations 4a9b6fe1ddc2671881c9aa3d6cc07e8e     
相互的关系( correlation的名词复数 )
参考例句:
  • One would expect strong and positive correlations between both complexes. 人们往往以为这两个综合体之间有紧密的正相关。
  • The correlations are of unequal value. 这些对应联系的价值并不相同。
14 valid eiCwm     
adj.有确实根据的;有效的;正当的,合法的
参考例句:
  • His claim to own the house is valid.他主张对此屋的所有权有效。
  • Do you have valid reasons for your absence?你的缺席有正当理由吗?
15 specifications f3453ce44685398a83b7fe3902d2b90c     
n.规格;载明;详述;(产品等的)说明书;说明书( specification的名词复数 );详细的计划书;载明;详述
参考例句:
  • Our work must answer the specifications laid down. 我们的工作应符合所定的规范。 来自《简明英汉词典》
  • This sketch does not conform with the specifications. 图文不符。 来自《现代汉英综合大词典》
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片