`Unbreakable' code system takes quantum leap
Nov. 18, NEW YORK (AP) -- Code-makers could be on the verge of winning their ancient arms race with code-breakers.
After 20 years of research, an encryption process is emerging that is considered unbreakable because it employs the laws of quantum physics.
This month, a small startup called MagiQ Technologies began selling what appears to be the first commercially available system that uses individual photons to transfer the numeric keys that are widely used to encode and read secret documents.
Photons, discrete particles of energy, are so sensitive that if anyone tries to spy on their travel from one point to another, their behavior will change, tipping off the sender and recipient and invalidating the stolen code.
"There are really no ways" of cracking this code, said Lov Grover, a quantum computing researcher at Bell Laboratories who is not involved with MagiQ.
Called Navajo -- a nod to the American Indian code specialists of World War II -- MagiQ's system consists of 19-inch black boxes that generate and read the signals over a fiber-optic line.
MagiQ (pronounced "magic," with the "Q" for "quantum") expects that with a cost of $50,000 to $100,000, Navajo will appeal to banks, insurers, government agencies, pharmaceutical companies and other organizations that transmit sensitive information.
"We think this is going to have a huge, positive impact on the world," said Bob Gelfond, MagiQ's founder and chief executive.
Encryption schemes commonly used now are considered safe, although they theoretically could be broken someday.
But even before that day arrives, Gelfond believes quantum encryption is superior in one important way. In some super-high-security settings, people sharing passwords and other information must have the same key, a massive string of digits used to encode data. Sometimes the keys will be transferred by imperfect means -- via courier or special software. They are not changed very often and can be susceptible to interception.
"Even if you have the perfect encryption algorithm, if someone gets your key, you're in trouble," Gelfond said.
The Navajo system not only transmits the keys on snoop-proof photons, it also changes them 10 times a second. "Even if somebody could get a copy of the key, it wouldn't do them any good," Gelfond said.
Of course, unbreakable codes would neutralize the ability of intelligence agents to intercept and read messages. That would necessitate greater reliance on human intelligence.
So does the world's foremost code-making and code-breaking organization, the U.S. National Security Agency, worry about the spread of quantum encryption? Better yet, is the NSA using the technology itself? Like most things about the NSA, the answers remain secret.
MagiQ is seeking the government's approval to sell Navajo boxes overseas. Gelfond hopes officials have realized -- after trying and failing to restrict encryption exports in the 1990s -- that there's little point in trying to "put the genie back in the bottle" once encryption methods have been invented. After all, he said, researchers in China are known to have experimented with quantum encryption.
At least one other company, Switzerland-based id Quantique, has produced a system similar to Navajo, although that remains in pilot phase.
Meanwhile, other organizations are exploring different ways of using subatomic particles as code carriers. QinetiQ, the commercial arm of Britain's defense research agency, and the national lab in Los Alamos, N.M., have experimented with transmitting quantum keys through the air rather than over fiber-optic lines.
Researchers at IBM, where quantum encryption was first demonstrated in the 1980s, are exploring ways to shrink quantum systems so they can plug more efficiently into existing computing and communications networks.
In any incarnation, quantum encryption employs one of the defining discoveries of physics: Heisenberg's Uncertainty Principle, which says subatomic particles exist in multiple possible states at once, however hard as that may be to imagine, until something interacts with them.
When one Navajo box sends out a code key, it imparts certain measurable characteristics to photons that travel through the fiber-optic line. When the second Navajo box measures those characteristics, that mere act throws off other characteristics -- but the Navajo boxes confer with each other after the transmission is complete and sort it all out.