Paper
28 September 2011 Cryptography and system state estimation using polarization states
Subhash Kak, Pramode Verma, Greg MacDonald
Author Affiliations +
Abstract
We present new results on cryptography and system state estimation using polarization states of photons. Current quantum cryptography applications are based on the BB84 protocol which is not secure against photon siphoning attacks. Recent research has established that the information that can be obtained from a pure state in repeated experiments is potentially infinite. This can be harnessed by sending a burst of photons confined to a very narrow time window, each such burst containing several bits of information. The proposed method represents a new way of transmitting secret information. While polarization shift-keying methods have been proposed earlier, our method is somewhat different in that it proposes to discover the polarization state of identical photons in a burst from a laser which codes binary information. We also present results on estimating the state of a system based on the polarization of the received photons which can have applications in intrusion detection.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Subhash Kak, Pramode Verma, and Greg MacDonald "Cryptography and system state estimation using polarization states", Proc. SPIE 8121, The Nature of Light: What are Photons? IV, 81210M (28 September 2011); https://doi.org/10.1117/12.893659
Lens.org Logo
CITATIONS
Cited by 6 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Polarization

Photons

Receivers

Cryptography

Computer intrusion detection

Optical spheres

Binary data

RELATED CONTENT

Single photon detector on avalanche photodiode
Proceedings of SPIE (December 20 2021)
QIPS: quantum information and quantum physics in space
Proceedings of SPIE (November 21 2017)
Link-layer vulnerabilities of quantum cryptography
Proceedings of SPIE (September 23 2005)
About the new architecture of quantum communication
Proceedings of SPIE (January 06 2009)
Free-space quantum cryptography for metropolitan areas
Proceedings of SPIE (October 16 2006)
Simulation of quantum cryptolographic key distribution
Proceedings of SPIE (September 13 2002)

Back to Top