back to article China's 'future-proof' crypto: We talk to firm behind crazy quantum key distribution network

Two hundred local government employees across the capital of China's eastern Shandong province will soon be encrypting messages with keys that are "impossible" to crack. QuantumCTek, headquartered in the humid, subtropical city of Hefei in eastern China, will next month launch a commercial network for creating and sharing …

  1. wolfetone Silver badge

    "No Back Door" you say?

    Well, if listening to politicians talk about encryption for the last few years has taught me anything, it's that I hope that ISIS aren't Chinese.

    1. The Man Who Fell To Earth Silver badge
      FAIL

      Re: "No Back Door" you say?

      Didn't comprehend the article, eh? The repeaters are the backdoors, as are the centers. That is why China likes this scheme. Backdoors are intrinsic to the architecture.

      1. Anonymous Coward
        Anonymous Coward

        Re: "No Back Door" you say?

        "China" "Encryption" "Control centre".

        Nope.

  2. lglethal Silver badge
    Boffin

    Just curious...

    Would it not be possible (and relatively easy) to build into your encryption algorithm a self destruct mechanism. i.e. if someone types in the wrong code more then a dozen times then the message is permanently scrambled/deleted. Seems like an extremely easy way to defeat brute forcing, and a heck of a lot cheaper and more scalable then going to Quantum computing...

    1. as2003

      Re: Just curious...

      No, not possible.

      How does your decryption algorithm know how many attempts I've made? I'm restoring from a backup every time I get it wrong.

      Besides, your decryption algorithm is public knowledge (because no one in their right mind is going to use it unless it's been peer reviewed and is well understood), so I'm currently writing a program to do the decryption and just skip the bit about deleting (or 'scrambling') the message when I get the password wrong.

      1. Anonymous Coward
        Anonymous Coward

        Re: Just curious...

        If I've read it right with quantum key sharing, the hard work can only be done in the key generation step. You can only confirm if Alice and Bob are the only holders of the key, or if someone has snagged the key (taken Alice's or Bob's). You cannot stop any other type of attack on the crypto (such as brute force decryption etc).

        Not sure if the method in the article covers this though.

  3. Anonymous Coward
    Anonymous Coward

    Misses the point

    The issue is not "guessing the key" of a symmetric cryptosystem like AES256 (after all, reducing 2^256 attempts to 2^128 attempts is still infeasible).

    It is about distribution of keys. This currently relies on asymmetric crypto like RSA or El Gamal, and these in turn are based on the difficulties of reversing certain mathematical problems (e.g. integer factorisation, discrete logarithm).

    Quantum computers in theory could give ways to attack those much faster than the best currently known methods.

    1. Charles 9

      Re: Misses the point

      But they still won't hold a candle to rubber-hose cryptanalysis and obtaining the data "outside the envelope".

      1. h4rm0ny

        Re: Misses the point

        Yes, but if someone tortures information out of me, I know about it. (Else it's not going to work as torture). There's a value in knowing whether your messages have been compromised all of itself.

        1. Charles 9

          Re: Misses the point

          But how much value? Knowing the message is compromised probably won't mean much if someone else knows the compromised message and because of this can preempt your intended goals.

          If you REALLY want to get the message without the target knowing, then you need to take the "outside the envelope" approach and simply snag the message in a phase where it MUST be decrypted.

  4. Anonymous Coward
    WTF?

    Shared key?

    For our classic crypto couple Alice and Bob to communicate, they first must receive a secret random number, N, that will be used to help authenticate their interaction via any one of the control centres.

    Erm. I might be missing something here but if the whole system relies on a securely delivered, shared random number N then you might just as well distribute a shared key, or a shared one-time pad.

    1. g0rg0r

      Re: Shared key?

      This is the point with QKD, if you read the stream you alter it. Hence when the data is sent out if anyone intercepts it it will be altered and what arrives at the remote end wont be the same, hence the encryption will be different or broken, depending on how you view it.

      1. DJ Smiley

        Re: Shared key?

        Ok.

        So the stream is sent, the end point reads it, it says ABC.

        Now instead, a middle man reads it first.

        Stream starts off 'random'.

        Middleman reads it, it now shows 'ABC'.

        End point reads it, it still shows 'ABC'.

        I'm unsure what's not being explained properly here, but something isn't. How can they check if the quantum state has been decided or not, if simply observing it will cause said state to be decided?

        'We know the cat is dead, because we opened the box to check on the cat!' -- There's no proof the cat was ever alive. In the same vain, there's no proof in this system, that it's actually doing any of the things it claims to do. It could just be AES-256, and still be secure enough that no one else on earth can crack it...

        1. phuzz Silver badge

          Re: Shared key?

          You're almost there: (Lets call the start Alice, and the endpoint Bob, as is traditional) My additions in italic

          So the stream is sent, and the end point (Bob) reads it, it says ABC.

          Bob uses ABC as the key to encrypt his message, and only Alice can read it, all good.

          Now instead, a middle man reads it first.

          Stream starts off 'random', lets say it's now DEF

          Middleman reads it, it now shows 'ABC'.

          Bob reads it, it still shows 'ABC'.

          Bob uses ABC as the key, and here's the important bit, because Alice has used DEF as the key, they can't communicate, so they know that the key exchange has been tampered with.

          Of course, now Alice and Bob just know that someone is trying to listen in to them, but they can't exchange encrypted messages until they find a way to communicate that bypasses the middleman.

          This is what quantum cryptography gets you, a way of detecting that the key exchange has been intercepted and read. You still need a decent crypto once you've exchanged keys, and in some ways it makes it easier for bad actors to 'jam' your communication.

      2. Anonymous Coward
        Anonymous Coward

        Re: Shared key?

        @g0rg0r - thanks for taking the trouble to respond

        If I understand you right, you are saying that the 'system' will know if the message has been intercepted. This may well be true - I can't tell from the article. But re-reading it, I know I am even more confused!

        Firstly it's not clear if the quantum bit only applies to the transmission of the keys as opposed to the transmission of the subsequently encrypted message. I think it is keys only and the message can, in theory, be sent by any means.

        Secondly, it didn't dawn on me until later that this is NOT a public key system. It's shared keys:

        Alice then sends the K1-encrypted message and K3-encrypted checksum to Bob. Bob uses K1 to decrypt the message, and verifies it came from Alice by decrypting the checksum with K3 and recomputing it using the random number N they'd shared previously.

        If Alice uses K1 and K3 to encrypt and Bob uses K1 and K3 to decrypt then this is nothing more than a fancy shared-key scheme.

        It also means there is a backdoor because the control centre also knows K1, K3 and N so they can decrypt any message at any time. (Providing they can get a copy, of course.)

        [Disclaimer: this is all based on the info in the article which may well be wrong. :-) ]

      3. ricardian

        Re: Shared key?

        Great idea, just read the stream and the true recipient will never be able to read the message.

  5. Nick Kew

    All in public

    ... interesting contrast to Usual Suspects like NSA/GCHQ or their contractors.

    I guess it saves foreign spies the trouble of following the work by clandestine means. Not to mention the potential for diplomatic incidents.

    Now the interesting question (on which I hope El Reg will keep us informed) is how governments around the world will react. Including those who preach Freedom of Speech.

  6. Anonymous Coward
    Anonymous Coward

    QuantumCTek like in Setec astronomy?

    Too Many secrets, Mr Bishop :)

    https://www.youtube.com/watch?v=GutJf9umD9c

  7. Your alien overlord - fear me

    I'm no quantum crypto specialist but if you read the key and the state gets changed from 0 to 1 (or 1 to 0), surely you just read the key twice and it goes back to it's original state and both end users are none the wiser. Or am I missing something even more obvious?

    1. phuzz Silver badge

      It's complicated, but without going into too many details once the message has been intercepted, it is irrecoverably changed. There is no way to recreate the original message without knowing it's contents.

      If you don't have a headache yet, the wiki entry is a good place to start.

  8. NanoMeter

    Backdoors for sure

    Rest of the world won't touch the crypto if it got backdoors - which I am pretty sure it has even if they deny it. The Chinese government won't allow it if it doesn't have backdoors.

  9. Anonymous Coward
    Black Helicopters

    Could we use the mirrors on the moon...

    To share photons and thus crypto keys then? :D

  10. ibmalone
    Alien

    The principle of quantum key distribution is based on how you do the measurement. It doesn't appear to have been explained in the article (beyond a quick mention of polarisation) and I'm not sure how it works with repeaters, but the idea is entangled photons are generated, sent to Alice and Bob and A and B both randomly choose which basis to measure in.

    If you think of linear polarisation, if the entanglement meant the photons had to have the same polarisation, then if A measures at 0 degrees and B measures at 90 degrees, only one of them detects a photon at a time, and they know the other one shouldn't have (spooky action at a distance, the first detection means the other photon must be in the corresponding state). However, if they add 45 and 135 degrees into the mix, on the occasions they didn't use the same basis there's a 50/50 chance of detection. If they randomly select which orientations to measure in, and then, after exchanging photons, they communicate which basis they used for each one, they can work out which measurements they've got correct. If they also share a small proportion of the actual measurements then they can work out if Eve was listening, because Eve wont have known which basis to forward the signal on in and will screw up the statistics for the ones where E guessed wrong. That's the idea, the actual scheme is a bit more convoluted from what I remember.

    Simplest (but inefficient) way to implement repeaters would be to have them work in A-B pairs and then use the one time pad generated to scramble the message all the way through. Might be possible to cause entanglement of forwarded photons (e.g. stimulated emission), not a method that would work for Eve as she would still have to make a "state-collapsing" measurement. (I say state collapsing as the simplest image, but I'm actually with Hugh Everett on this.)

    1. stevejs

      Repeaters

      Could you not use EDFAs (erbium-doped fiber amplifiers) to give the photons more energy without changing their state.

      1. ibmalone

        Re: Repeaters

        Apparently they don't preserve quantum state, but people are working on it http://www.nature.com/nphoton/journal/v9/n2/full/nphoton.2014.311.html

        Generally, you can't give a photon more energy, you can only absorb it and re-emit another. For a single photon more energy also means different frequency, being quanta they are indivisible, E=ħω. A classical amplifier is a cascade device, one photon to many.

  11. stevejs

    Quantum state is changed by reading!

    "Quantum state is changed by reading", therefore read again to change back to the original state - hah - I've got it cracked!

  12. ps2os2

    Didn't the Swiss do this first?

    I remember an article about the Swiss doing thi a year or two ago. Anybody remember?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like