[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

*To*: Crypto List <[email protected]>, [email protected], [email protected]*Subject*: Subquantum Crypto Attack*From*: [email protected] (John Young)*Date*: Fri, 26 Jul 2013 12:43:52 -0400*In-reply-to*: <[email protected] mail.com>*References*: <CAFv7Oijz0yvbbPsz2BQDXGD3wzrxkax=r++YLwwzQEQRjCkChg@mail.gmail.com> <[email protected]> <CAFv7Oiirasi1HYp1bAd8PCyYabTVtsnKcOyfcOZpEca2kU8dRQ@mail.gmail.com>

Has subquantum crypto attack been substantiated? arXiv:quant-ph/0203049v2 12 Apr 2002 Subquantum Information and Computation Antony Valentini It is argued that immense physical resources Â? for nonlocal communication, espionage, and exponentially-fast computation Â? are hidden from us by quantum noise, and that this noise is not fundamental but merely a property of an equilibrium state in which the universe happens to be at the present time. It is suggested that Â?non-quantumÂ? or nonequilibrium matter might exist today in the form of relic particles from the early universe. We describe how such matter could be detected and put to practical use. Nonequilibrium matter could be used to send instantaneous signals, to violate the uncertainty principle, to distinguish non-orthogonal quantum states without disturbing them, to eavesdrop on quantum key distribution, and to outpace quantum computation (solving NP-complete problems in polynomial time). ... 6 Eavesdropping on Quantum Key Distribution Alice and Bob want to share a secret sequence of bits that will be used as a key for cryptography. During distribution of the key between them, they must be able to detect any eavesdropping by Eve. Three protocols for quantum key distribution Â? BB84 [20], B92 [21], and E91 (or EPR) [22] Â? are known to be secure against classical or quantum attacks (that is, against eavesdropping based on classical or quantum physics) [23]. But these protocols are not secure against a Â?subquantumÂ? attack [7]. ... E91 is particularly interesting for it relies on the completeness of quantum theory Â? that is, on the assumption that there are no hidden Â?elements of realityÂ?. Pairs of spin-1/2 particles in the singlet state are shared by Alice and Bob, who perform spin measurements along random axes. For coincident axes the same bit sequence is generated at each wing, by apparently random quantum outcomes. Â?The eavesdropper cannot elicit any information from the particles while in transit ..... because there is no information encoded thereÂ? [22]. But our Eve has access to information outside the domain of quantum theory. She can measure the particle positions while in transit, without disturbing the wavefunction, and so predict the outcomes of spin measurements at the two wings (for the publicly announced axes).12 Thus Eve is able to predict the key shared by Alice and Bob.

**References**:**SSLegance***From:*[email protected] (tz)

**SSLegance***From:*[email protected] (Andy Isaacson)

**SSLegance***From:*[email protected] (tz)