Next Generation Security Software Quantum Cryptography A study into the present technologies and future applications Bill Grindlay
[email protected] 14th January 2003 ©2003 Next Generation Security Software Ltd www.ngssoftware.com “Anyone who is not dizzy after his first acquaintance with the quantum of action has not understood a word.” - Niels Bohr (1885-1962) “When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.” - Anonymous 2 3 Contents Introduction .............................................................................................................. 5 A Brief History of Cryptography................................................................................ 6 The Development of Quantum Theory...................................................................... 11 The Advent of Quantum Cryptography..................................................................... 13 Is Quantum Cryptography Secure?.......................................................................... 16 Absolute Security and the Wider Social Issues......................................................... 19 Conclusion.............................................................................................................. 26 4 Introduction In October 1989 at 3 o’clock in the morning at IBM’s Thomas J. Watson Research Centre near New York, Dr. Charles Bennett and a research student named John Smolin witnessed the first ever quantum cryptographic exchange. Using polarised light photons, computers called Alice and Bob successfully