Skip to main content
Physics LibreTexts

3.5: Quantum Cryptogaphy

  • Page ID
    34644
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)

    ( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\id}{\mathrm{id}}\)

    \( \newcommand{\Span}{\mathrm{span}}\)

    \( \newcommand{\kernel}{\mathrm{null}\,}\)

    \( \newcommand{\range}{\mathrm{range}\,}\)

    \( \newcommand{\RealPart}{\mathrm{Re}}\)

    \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)

    \( \newcommand{\Argument}{\mathrm{Arg}}\)

    \( \newcommand{\norm}[1]{\| #1 \|}\)

    \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)

    \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    \( \newcommand{\vectorA}[1]{\vec{#1}}      % arrow\)

    \( \newcommand{\vectorAt}[1]{\vec{\text{#1}}}      % arrow\)

    \( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vectorC}[1]{\textbf{#1}} \)

    \( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)

    \( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)

    \( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)

    \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)

    \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)

    \(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)

    One of the most remarkable consequences of Bell’s thought experiment is that it provides a way to perform cryptography that is more secure, in certain respects, than conventional cryptography. This possibility was first raised by Ekert, and it has led to a huge amount of research into quantum cryptography, which is poised to be one of the most important technological applications of quantum mechanics.

    Ekert’s quantum cryptography scheme allows two participants, Alice and Bob, to share with each other a string of random binary digits (0 or 1), called a “key”, in such a manner that no one else can learn the key by eavesdropping on their communications. Once Alice and Bob have established a secret shared key, it can be used to encrypt subsequent messages between them, which nobody else can decipher (e.g., by using one-time pads).

    The scheme follows almost immediately from the Bell thought experiment of Section 3.4. In each round, a pair of spin-\(1/2\) particles is prepared in the singlet state, with particle \(A\) sent to Alice and \(B\) sent to Bob. Alice and Bob each randomly choose a measurement axis (\(S_1\), \(S_2\), or \(S_3\)), and measure the spin of their particle along that axis.

    After an appropriate number of rounds, Alice and Bob publicly announce their choices of measurement axes. These announcements are assumed to take place over a classical communication channel that cannot be jammed or manipulated by any hostile party (though it can be eavesdropped upon). From the announcements, Alice and Bob determine the rounds in which they happened to pick the same axes. Their measurement results during these rounds are guaranteed to be the opposites of each other. Hence, they have established a random binary string known to each other but to no one else.

    How might an eavesdropper, Eve, attempt to foil this scheme? Suppose Eve can intercept some or all of the particles \(B\) destined for Bob. She might try to substitute her own measurements, in a manner that could let her work out the secret key. However, Eve is hampered by the fact that she is unable to predict or influence Bob’s choices of measurement axes (i.e., Bob’s choices are truly random), nor is she able to impersonate Bob during the announcements of the axis choices (i.e., the classical communication channel is unjammable). Under these assumptions, it can be shown that any attempt by Eve to substitute her own measurements can be detected by Alice and Bob, by performing a statistical analysis of their measurement results in the rounds with different different axis choices. The detection of the eavesdropper turns out to be essentially the same as checking for Bell’s inequality. For details, refer to Ref.

    Alternatively, Eve might try to “clone” the quantum state of particle \(B\) before passing it along to Bob. If this can be done, Eve can retain the cloned quantum state, wait for Bob to announce his choice of measurement axis for that round, and then perform the corresponding measurement to reproduce Bob’s result. Though plausible at first glance, this turns out to be fundamentally unworkable, as it is incompatible with the laws of quantum mechanics.

    The so-called no-cloning theorem can be proven as follows. Eve desires to clone an arbitrary state of a spin-half particle \(B\) onto another spin-half particle \(C\). The two-particle Hilbert space is \(\mathscr{H}\otimes\mathscr{H}\). With particle \(C\) initially prepared in some state \(|0\rangle\), Eve must devise a unitary operation \(\hat{U}\), representing the cloning process, such that

    \[\hat{U} |\psi\rangle | 0\rangle = e^{i\phi} |\psi\rangle |\psi\rangle \label{clone}\]

    for all \(|\psi\rangle \in \mathscr{H}\), and for some phase factor \(\phi\) that could depend on \(|\psi\rangle\). Note that the value of \(\phi\) does not affect the outcomes of measurements.

    Now replace \(|\psi\rangle\) in the above equation with two arbitrary states denoted by \(|\psi_1\rangle\) and \(|\psi_2\rangle\), and take their inner product. According to Equation \(\eqref{clone}\),

    \[\begin{align}\begin{aligned} \Big(\langle \psi_1 | \langle 0 | \hat{U}^\dagger \Big) \Big(\hat{U} | \psi_2 \rangle |0\rangle \Big) &= \Big(\langle \psi_1| \langle \psi_1| e^{-i\phi_1} \Big) \Big( e^{i\phi_2} |\psi_2\rangle|\psi_2\rangle\Big) \\ &= e^{-i(\phi_1-\phi_2)} \Big( \langle\psi_1 | \psi_2\rangle \Big)^2. \end{aligned}\label{clone1}\end{align}\]

    Here, \(\phi_1\) and \(\phi_2\) are the phase factors from Equation \(\eqref{clone}\) for the two chosen states. On the other hand, since \(\hat{U}\) is unitary,

    \[\begin{align}\begin{aligned} \langle \psi_1 | \langle 0 | \hat{U}^\dagger \hat{U} | \psi_2 \rangle |0\rangle &= \Big(\langle \psi_1 | \langle 0| \Big) \Big(| \psi_2 \rangle |0\rangle\Big) \\ &= \langle\psi_1 | \psi_2\rangle. \end{aligned}\label{clone2}\end{align}\]

    Here we have used the fact that \(\langle 0 | 0\rangle = 1\). Comparing the magnitudes of \(\eqref{clone1}\) and \(\eqref{clone2}\),

    \[\big|\langle \psi_1 | \psi_2\rangle \big|^2 = \big| \langle\psi_1 | \psi_2\rangle \big| \;\;\Rightarrow \;\; \big|\langle\psi_1 | \psi_2\rangle\big| = 0 \;\mathrm{or}\; 1.\]

    But aside from the trivial case of a one-dimensional Hilbert space, this cannot be true for arbitrary \(|\psi_1\rangle\) and \(|\psi_2\rangle\). For instance, for a two-dimensional space spanned by an orthonormal basis \(\{|0\rangle, |1\rangle\}\), we can pick

    \[|\psi_1\rangle = |0\rangle, \; |\psi_2\rangle = \frac{1}{\sqrt{2}}\big(|0\rangle + |1\rangle\big) \;\;\Rightarrow\;\; \big|\langle\psi_1|\psi_2\rangle\big| = \frac{1}{\sqrt{2}}.\]


    This page titled 3.5: Quantum Cryptogaphy is shared under a CC BY-SA 4.0 license and was authored, remixed, and/or curated by Y. D. Chong via source content that was edited to the style and standards of the LibreTexts platform.